LinkedIn logo

LinkedIn-based intel gathering campaign targets security industry

Pro
Image: LinkedIn

7 September 2015

For the past several weeks an intelligence-gathering campaign has been using fake LinkedIn recruiter profiles to map out the professional networks of IT security experts, researchers from F-Secure have discovered.

LinkedIn can be a great tool to establish new professional relationships and discover job opportunities. However, accepting connection requests from unknown people is a double-edged sword that can put both employees and the companies they work for at risk.

There are multiple cases where attackers have used fake LinkedIn profiles to gather sensitive information about organisations and their employees. Knowing who is the manager of a particular department in a company or who is a member of the organisation’s IT staff can be very useful in planning targeted attacks.

Fake profiles
In 2012, a team of security experts created a LinkedIn profile for a fake new female hire at a US government agency as part of a sanctioned test. By befriending multiple employees and establishing relationships, the team raised the credibility of their fake identity and eventually gained enough information to launch a successful attack against the organisation’s IT security manager, who did not even have a LinkedIn or other social media account.

People tend to expose a lot of information on LinkedIn about their work environments, colleagues, the company’s infrastructure and even internal projects.

An organisation called the Transparency Toolkit used LinkedIn to collect over 27,000 resumes from people working in the US intelligence community. By analysing them, it uncovered new surveillance programs, secret code words, companies that help with surveillance and, of course, personal information about signals intelligence analysts.

The suspicious LinkedIn recruiting campaign that targets security researchers was first mentioned on Twitter on 18 August by Yonathan Klijnsma, a threat intelligence analyst at Dutch security firm Fox-IT.

Finnish researchers
Researchers from Finnish antivirus firm F-Secure decided to look into it after some of the company’s own staff were targeted. They published their findings in a blog post.

The F-Secure researchers found multiple LinkedIn accounts of people claiming to work for a company called Talent Src, or Talent Sources. The accounts, most of which were for female identities, appeared to belong to recruiters for particular security industry specialties like malware analysis, embedded security, mobile security, cryptography, automotive security or digital forensics. Two accounts were specifically hunting security executives.

Reverse image searches revealed that the logo used by Talent Src had been copied from a different organisation and had the company name added to it.

The profile pictures used by the fake recruiters were also copied from Instagram or legitimate LinkedIn profiles, but had been horizontally flipped to make reverse image searching harder, the F-Secure researchers said.

Endorsements
At least one of the fake recruiters, using the name Jennifer White, had received endorsements from new connections for skills that she clearly did not have based on her listed work history.

Such endorsements can establish an account’s credibility and make it easier for attackers to score additional connections.

A person who endorsed Jennifer White and who works at a large US-based defence contractor admitted that it was “a bad habit to give out such endorsements without really knowing the other person,” the F-Secure researchers said.

The people behind the fake recruiting accounts only keep the fake identities they create for about a week and then remove the profile pictures and change the names associated with the accounts.

Unclear goals
It is not clear what their end goal is. The campaign could be part of a research project about social media risks that someone plans to disclose at a later time or could be the work of hackers looking to gather information they could use to build targeted attacks against security companies.

According to reports based on documents leaked by former US National Security Agency Edward Snowden, the UK’s GCHQ used fake LinkedIn profiles to target network engineers from Belgian telecommunications operator Belgacom in the past.

Regardless of whether this new intelligence gathering campaign is malicious or not, the incident should serve as a reminder to employees everywhere that accepting connection requests from unknown persons on social media can be dangerous and so is detailing your existing work duties in online resumes.

 

 

Lucian Constantin, IDG News Service

Read More:


Back to Top ↑

TechCentral.ie