Threat Level: green Handler on Duty: Russ McRee

SANS ISC: LinkedIn Breach Data Used For Malicious E-Mails - Internet Security | DShield SANS ISC InfoSec Forums


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
LinkedIn Breach Data Used For Malicious E-Mails

Yesterday, the German federal CERT (CERT-BUND) warned of phishing e-mails that are more plausible by using data that appears to originate from the recently leaked LinkedIn data set. The e-mail address the recipient by full name and job title. Typically, the attachments claim to contain an invoice.

We have since received a couple of users who reported receiving e-mails that match the pattern. For example: 

(Thanks to our reader Arjan for the sample)

The e-mails arrive in different languages. They address the recipient by full name, job title and company name, to make the e-mail more plausible.

This is similar to the way social media was used in the past to create more convincing phishing e-mails. For example, see this old article from 3 years ago about how Facebook data is used in this way. With the LinkedIn leak, data has become available that wasn't reachable by simple screen scrapers (or API users) in the past. 

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

I will be teaching next: Intrusion Detection In-Depth - SANS Boston Summer 2019

Johannes

3575 Posts
ISC Handler

Sign Up for Free or Log In to start participating in the conversation!