Friday, November 1, 2024
HomeCyber Security NewsMicrosoft Two-Step Phishing Campaign Attack LinkedIn Users

Microsoft Two-Step Phishing Campaign Attack LinkedIn Users

Published on

Malware protection

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for work communication. Their integration creates cybersecurity vulnerabilities. 

Threat actors can target employees on social media using their accounts accessed from work devices.

These accounts act as attack vectors, allowing unauthorized access to the organization’s systems. 

- Advertisement - SIEM as a Service

A new LinkedIn threat combines breached users’ accounts and an evasive 2-step phishing attack.

A recent Python-based infostealer called Snake targets Facebook users with malicious messages.

By tricking users into downloading malware, Snake steals sensitive browsing data to hijack accounts. 

It highlights how social media is a potential attack vector for stealing credentials and compromising corporate systems. 

“Sales Proposal” Office Word document hosted on onedrive.live.com
“Sales Proposal” Office Word document hosted on onedrive.live.com

LinkedIn is a social media platform for professional networking that is vulnerable to attacks due to the abundance of publicly available user data. 

Attackers can harvest email addresses for surveys and use fake profiles to deliver malware through phishing attacks. Perception Point recently discovered a new attack that combines compromised user accounts with a 2-step phishing scheme to bypass detection. 

Document
Run Free Threat Scan on Your Mailbox to Stop Phishing

Protect Your Business Emails with AI-Powered Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Compromised LinkedIn accounts had been exploited to launch social engineering attacks. The attackers sent messages to the victim’s network, pretending to be a trusted connection (1st degree). 

An example of a deceptive message from a compromised account
An example of a deceptive message from a compromised account

The messages contain a malicious link disguised as a legitimate OneDrive document link, often using the lure of a confidential project to trick the victim into clicking it, leading to an account takeover. 

Attackers use a hidden JavaScript payload that shows fake protection DDoS display screen
Attackers use a hidden JavaScript payload that shows fake protection DDoS display screen

Phishing actors utilize a two-step attack. First, they trick victims into clicking a URL that leads to a legitimate OneDrive page hosting a malicious Word document. 

Free Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register for Free

Second, the document embeds a URL redirecting victims through a fake Cloudflare verification prompt before landing on a phishing webpage designed to steal Microsoft 365 credentials. 

3rr0r Hun73r – the threat actor behind the phishing website
3rr0r Hun73r – the threat actor behind the phishing website

The phishing page’s HTML code reveals it originates from a group called “3rr0r Hun73r” that creates and sells phishing kits. 

Social media’s popularity creates a vulnerability for enterprises where hackers exploit employees’ social media use within work browsers to steal personal and corporate data. 

Secure your emails in a heartbeat! Take our free 30-second assessment and get matched with your ideal email security vendor.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...