Hackers now submit fake LinkedIn jobs to steal user data

Hackers now submit fake LinkedIn jobs to steal user data
Millions of people are active on LinkedIn in pursuit of a work occasion following the impact of Covid-6. These people are looking for a job after losing it due to the pandemic or they are looking for a better job. However, not only web job seekers and employers are active on the professional internet, hackers are also active on LinkedIn. These hackers come up with innovative ways to lie to low-income claimants into sharing their personal information or even to give these criminals unrestricted access to their computers. A group of scammers known as "Golden Chicken" and supported by advanced threat suites such as FINXNUMX, Cobalt Group and Evilnum are behind the new age attack targeting job seekers, according to a LinkedIn report.

How do you identify fake jobs on LinkedIn?

According to eSentire, the easiest way to identify a fake job posting is to look at the name and type of the file that was sent to you. A message containing a job offer in a "Zip" file format may be the first sign. So, the research team suggests looking at the name of the file and also notes that "LinkedIn member status is listed as Senior Account Executive - International Upload, the malicious zip file would be named Senior Account Executive - International Upload Situation (please note table "finally added situation"). " Therefore, the word "situation" at the end is the biggest clue that this file could be a harmful Trojan horse and should be removed.

What happens if someone opens it?

According to the Threat Response Unit at eSentire, a leading distributor of cybersecurity solutions, hackers send fake zip jobs to job seekers. This zipped file contains silent self-installing Trojans called "no more eggs" that are installed as soon as the file is unzipped, giving criminals unrestricted access to users' devices. When these hackers gain access to the device, it provides a back door for the criminals to install any malware of their choosing, including ransomware, credential stealers, banking malware, or even just to steal user data silently. What makes this attack deadly is the fact that this malware runs in silent mode and uses normal Windows processes to run, so your computer's antivirus program probably won't even pick it up. The best way to avoid this attack is to monitor the files you download to your computer. Make sure it's from an authentic source and if it's a zip file, be very careful about obvious clues like the name etc. In normal situations, you will not receive a job offer for a job you never asked for. Get up close with the top tech news you can use, the latest reviews and buying guides. Follow LaComparacion India on Twitter, Fb and also Instagram!