USA TODAY US Edition

LinkedIn stranger requests could harbor scams

Social network warns users to accept only “trusted connection­s”

- SAN FRANCIS CO Elizabeth Weise @eweise USA TODAY

Most of us have done it: Eager to build profession­al leads that might open a door to the next job or sales deal, we’ve accepted that LinkedIn request from an unknown contact. Wrong move.

A go-to staple for profession­als, LinkedIn can pose dangers to unsuspecti­ng users because people have come to have confidence in it and by extension, implicit faith that all accounts on the platform are legitimate.

Enter the hackers. Cybersecur­ity firms say criminals have figured out how to subvert the network by posing as authentic, boring, cubicle-office dwellers.

“It’s got trust built into it, and hackers leverage that trust to their own nefarious purposes,” said Allison Wikoff, a senior researcher with the counter threat unit at SecureWork­s, an Atlantabas­ed security company.

Last month, hackers stole and posted more than 3 terabytes of files from the music video site Vevo — a breach that began with a single phishing attack through LinkedIn. A group called Our-Mine claimed responsibi­lity.

Once part of a user’s network, a LinkedIn contact can see another’s email address (if the user has made that available). He or she has also establishe­d a personal connection that makes it more likely the target will open an email that contains malware.

“They can really tailor the phishing email to the person’s profile, based on what they do for

a living, what type of job they have, all of which makes it so much easier to trick them into clicking a link,” Wikoff said.

The social network, wary of losing its credibilit­y, has tried to stamp out these hoax users and warn its 500 million users to do

the same.

“The most important thing LinkedIn members can do to protect themselves is to only accept requests from people they know or recommende­d contacts from a trusted connection,” said Paul Rockwell, head of LinkedIn’s

trust and safety unit.

The company also has an entire team dedicated to finding and rooting out fake accounts, which it says comprise a tiny portion of its users, and offers a website to report fake or co-opted accounts.

Acquired by Microsoft in 2016, LinkedIn has become the de facto repository of most people’s occupation­al lives, a place where their résumé lives and where the world — and potential employers — can find out about their profession­al abilities.

That’s why you should investigat­e before you click “Accept,” said J.D. Gershbein, CEO of Owlish Communicat­ions, a Chicagobas­ed company that helps profession­als hone their LinkedIn profiles.

He himself only accepts about one out of every five invitation­s that come his way.

Be especially careful of profiles that seem thin on facts or too good to be true. If you find one with no head shot or a person with fashion-model looks and a short or non-existent work history, be cautious. Gershbein says he’s seen those sorts of invitation­s far too many times.

Sometimes attackers are simply trying to harvest email addresses to send spam to. But as in the Vevo case, LinkedIn can also be used as a way to lure the unwary into clicking on phishing emails.

Once the recipient clicks on a link or opens a document that contains malware, the malicious software infiltrate­s their computer, compromisi­ng everything on it and possibly any networks it connects to.

Sometimes these are tied to industrial espionage or even statespons­ored attacks.

Wikoff ’s team at SecureWork­s spent a year tracking a group it dubbed Cobalt Gypsy, which had created a fake LinkedIn profile for a non-existent London-based photograph­er named “Mia Ash.” The group targeted telecommun­ications, government, defense, oil and financial services organizati­ons with links to the

Middle East, SecureWork­s says. It believes the group was associated with Iranian government-directed cyber operations.

The Mia Ash persona used a photo of an attractive young woman, an actual photograph­er in Romania with a different name, and the mainly male victims it targeted all too often agreed to connect with her. Once they did, “she” talked them into chatting on Facebook and other venues, ending in a request to fill out an online survey about travel that she sent them.

Some users wonder why it would be worth anyone’s time to target them. But the stakes are low for attackers, say experts.

“It’s not like robbing a bank, where you go to jail. The majority of them may fail. but it doesn’t cost much. If they run 100 attempts and only two work, it’s a great success rate,” said Joseph Steinberg, with SecureMySo­cial, a firm that works with companies on problems associated with employees’ use of social media.

REAL FAKE PEOPLE

Another tactic frequently used by scammers is creating a LinkedIn account for someone who doesn’t have one, or a copy-cat account if they do, which they then use to try to lure in people.

“This really does freak people out, finding themselves on a social media network and it’s not them,” said Zack Allen, threat operations manager for ZeroFOX, a Baltimore-based company that works with companies on social media risks.

The danger is not so much to the person whose account it purports to be, but to the victims it is aimed at. For example, attackers might find someone high up at Chevron who doesn’t have a LinkedIn account, create one in their name and then use it to target people in the oil and gas industry.

“It’s very easy to think, ‘Chevron’s talking to me, I must be really smart, this is great!’ And that’s when the attack kicks off,” said Allen.

Someone attempted this with computer security expert Bruce Schneier this summer when he discovered a LinkedIn account had been created in his name. LinkedIn was quick to help him shut it down, and he then created his own account in self-defense. This one, however, has no entries beyond telling visitors, “I don’t log in, I never post anything, and I won’t read any notes or comments you leave on this site.”

That’s why experts urge even people who don’t want LinkedIn accounts to check periodical­ly to make sure none have been created using their name. It’s also helpful to check nicknames and diminutive­s, just in case someone’s trying for Chuck Taylor when you go by Charles.

LinkedIn has become a musthave and a must-protect, said Gershbein.

“LinkedIn is where you go to find a job but it’s also a place ... where HR people recruit talent and where companies showcase their culture. It’s important,” he said.

 ?? SECUREWORK­S ?? This fake profile, which used the photo of an actual photograph­er with a different name, lured profession­als into downloadin­g malware.
SECUREWORK­S This fake profile, which used the photo of an actual photograph­er with a different name, lured profession­als into downloadin­g malware.

Newspapers in English

Newspapers from United States