Monday, February 6, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Phishing to Data Harvesting: LinkedIn Turns Playground For Cyber Fraud

Editorial by Editorial
August 7, 2022 - Updated on August 8, 2022
in Firewall Daily, Main Story
2
Phishing to Data Harvesting: LinkedIn Turns Playground For Cyber Fraud
586
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

A recent report by cybersecurity company Check Point put LinkedIn in the top spot for the most impersonated brand in phishing campaigns observed during the second quarter of 2022. That report also created a parallel discussion on recruitment fraud and reputation harm done on the platform. It turns out that both are easier than thought about earlier, found out by The Cyber Express research.

Why LinkedIn

As with all social media services, LinkedIn, too, maintains that it is not a publisher but a platform. Although certain content monitoring systems are in place, the onus of content legitimacy is usually on the creator.

You might also like

Hollywood and its Quest with Nailing Hacking Depictions

Internet Censorship and Freedom of Speech

Voice Networks are Under Attack – is Anybody Listening?

We probed further to discover that anyone can claim to be an official of an organization by linking his LinkedIn profile to that of the particular company. This allows anyone to leech on the organization’s goodwill, gain followers, and even run recruitment scams on LinkedIn.

The extreme situation is an actual hijack of an existing user profile when the objective is to cash in or harm the reputation of the person or company. The hook is usually a scam message/mail that warns of your profile being locked out and asks you to list your login details.

Example of a phishing scam listed on the LinkedIn Safety Center web page.

Such scamsters run below the radar till someone notifies the profile. Usually, when the fraud profile attracts the attention of genuine employees who work in the same department or the firm, recruiters told Cyber Express. However, the recruitment process through LinkedIn is so fast that fraudsters would delete the profile and leave before this “eventual spotting” happens, said Deepak Tripathi, founder of staffing and recruitment company Johire.

Bigger target, bigger harm

“LinkedIn vastly differs from other job portals,” said Tripathi. “Here, you not only list your professional journey but also connect with all levels of executives in companies across the world. This platform gives you interesting jobs, good candidates, as well as leads to grow your business and professional network.”

He concedes that he often found it challenging to use the platform alone to verify the credentials of employers and candidates. The harm aggravates when top executives or the brand itself are targeted. Cybersecurity companies have started spotting opportunities in this threat.

“In cybersecurity terms, “brand” is relatively new – what once was seen as a marketing challenge has rapidly grown into a legitimate security issue. Now, when we talk about brand protection, it’s not limited to managing how people talk about you; it’s also about criminals pretending to be you,” wrote Brian Kime, vice president of intelligence strategy and advisory at a U.S.-based cybersecurity company ZeroFox.

The damage is often instant, and the tools to protect your brand should be capable of averting the threat, he wrote in an advisory post titled “CISO, We Have a (Brand) Problem”.

Red flags

Many red flags show themselves when we take a second look, assured Tripathi.

“A few months back, a friend got in touch with me to verify a job opportunity. The “Dubai-based employer” was demanding some sort of registration fee. The demand was unusual and the amount was high,” he said.

A detailed look at the invoice showed a GST charge, but no GST number was mentioned. Being the promoter of a GST-registered recruitment company, Tripathy could easily spot the fraud.

Tripathi has a playbook for spotting fraud on LinkedIn. Some of the usual red flags are as follows:

  • Check the company’s website. If it has one, check whether it is SSL certified, i.e. https or http. A secured website brings some legitimacy.
  • Check the company’s activity on LinkedIn. A long history of regular posts, particularly new appointments, earns some trust.
  • Are people talking about the company/founders/HR on LinkedIn? Check their comments and points.

On the other hand, companies can save their reputation with these steps, says Tripathi.

  • Audit your LinkedIn presence from time to time, from your employees to those who tag your name on their posts.
  • Notify fake profiles in public posts.
  • Watch out for job posts on behalf of the company. Check out the author’s profile.
  • Watch out for data gatherers. They don’t intend to target the company but are out there to gather personally identifiable information (PII) using fraudulent job posts. You might face vicarious liabilities arising out of such situations if it is proven that you could have prevented it.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Check Point Researchcyber expresscyber express newsLinkedInPhishingPhishing Reportscams
Previous Post

Chinese Automotive Industry to Get Security Upgrade

Next Post

Scammer Books Uber to Take Elderly Woman to Bank

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

by Editorial
February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

by Editorial
February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

by Editorial
February 4, 2023
Firewall Daily

Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

by Ashish Khaitan
February 4, 2023
Dominic Alvieri
Firewall Daily

After Hive, Will More Ransomware Groups be Taken Down in 2023?

by Vishwa Pandagle
February 4, 2023
Next Post
Scammer Books Uber to Take Elderly Woman to Bank

Scammer Books Uber to Take Elderly Woman to Bank

Comments 2

  1. Pingback: Hackers Use Coinbase Job Offers to Target Fintech Employees
  2. Pingback: Twilio Phishing Attack: 1900 Signal Accounts Compromised

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Yanluowang Ransomware Gang

Yanluowang Ransomware Gang Hacked, Internals Chats Leaked

November 7, 2022
Cyber Monday Deals

Cyber Monday Deals 2022: How To Shop Smart & Get Best Discounts

November 26, 2022

Categories

Don't miss it

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

February 4, 2023
Firewall Daily

Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

February 4, 2023
LockBit. Ion Group
Cybersecurity News

LockBit Claims Ransom From ION Group, Firm Declines To Comment

February 4, 2023
Dominic Alvieri
Firewall Daily

After Hive, Will More Ransomware Groups be Taken Down in 2023?

February 4, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.