New Delhi: Cybercriminals are hiding malware in fake LinkedIn job offers, according to a new report by security firm eSentire. The company’s Threat Response Unit (TRU) has revealed that hackers are hiding malicious zip files in fake job offers on a professional social media platform, in a new form of underwater blow attack.
For example, if a LinkedIn member’s job is listed as a Senior Executive Executive – International Freight, the malicious zip file will be called a Senior Account Executive – International Freight position (note the “position” added at the end). , the victim unknowingly initiates a covert installation of the backdoor without files, more_eggs, “the company said in a blog post.
Also read | How the Indian banking model has changed
According to eSentire’s TRU, malware installs a “sophisticated background network” that can give hackers access to the victim’s computer. They sell them as malware-as-a-service (MaaS) to other cyber criminals, who can use them to steal users Once malware is found on the victim’s computer, it can allow cyber criminals to install ransomware, stolen credentials, bank malware or another background network on the affected computer.
The victim’s malware is a fraudulent Word document, which looks like a recruitment application but has no “functional purpose.” It does so while hijacking legitimate Windows processes that allow malware to access the victim’s computer. “Used only to distract victims from ongoing background tasks more_eggs “, they said from the company.
Robb McLeod, senior director of TRU, said the malware posed a “terrible threat to companies and business professionals.” Regular antivirus software and security solutions do not take it because they use common Windows processes. download malware because it is hidden in a job ad that already interests them. “It’s the perfect time to take advantage of job seekers who are desperately looking for work,” the company said. “Therefore, customized bait for work is even more tempting in these difficult times,” it adds.