Story image

Subdomain spoofers turning to ‘trusted’ brand LinkedIn to spam users

14 Feb 2017

LinkedIn has become the target of a new phishing campaign, and the company is powerless to block the attacks in the traditional ways.

Proofpoint discovered the campaign, which uses spoofed subdomains to get users to supply their LinkedIn credentials.

The company says the emails aren’t designed to attack customers or partners, but they are exploiting domains and could eventually damage the victim’s brand.

“if users see enough of these emails and flag them as spam, then mailbox providers may begin to penalize emails sent from example.com and its subdomains,” Proofpoint says.

This new approach is a new variation of subdomain spoofing, which traditionally targeted one company at a time and uses many aspects of the subdomain element.

This approach is new, as it uses all of the sending domains of a large number of companies and prepends them with an established and trusted brands, Proofpoint says.

Attackers send the phishing attempts over other companies’ subdomains, not the traditional LinkedIn domains. This means LinkedIn is unable to block the attacks.

Proofpoint says that LinkedIn has long been building a community of trust, and attackers are now taking advantage of that trust.

Attackers have used the LinkedIn brand to create spoofed subdomains:

Proofpoint warns that this new combination of subdomain spoofing and snowshoe spamming can affect almost any business – and can use almost any large and trusted brand.

Proofpoint recommends that companies:

  • Prepare all subdomains
  • Consider all parent domains
  • Add necessary tags
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."