LinkedIn social engineering scams continue to increase, and even cybersecurity professionals like me are not exempt from such encounters. And even though this particular attempt evoked more of an eye roll, I believe it’s still worth sharing for two reasons:
So, without further ado, this is the anatomy of a LinkedIn social engineering scam that targeted me.
It started innocently enough; in a message, the scammer mentioned ‘podcast,’ meaning to lure me as a podcast host.
However, given the rudimentary nature of the message and non-native syntax, it became immediately obvious that the scammers most likely did their reconnaissance by scraping profile data. Particularly, their outreach message is generic and could be directed at anyone with ‘podcast’ in their title.
But this podcast scam had another ace: the appeal to ego. This tactic makes sense: who doesn’t want someone promoting them, right? More effective attacks, particularly job scams, are tailored to targets’ interests, skill sets, and professional aspirations. They mention a specific ‘episode’ of your career. For example, they’ll bring up the possibility of promotion from director to VP. They’ll follow that up with specific skill sets evident on other LinkedIn profiles.
Again, this may sound easy to detect and deflect, but Linkedin social engineering attacks are exactly how threat actors like the Lazarus Group, OilRig, and Chinese counterintelligence have successfully compromised employees in defense, aerospace, cybersecurity, and network administration. After connecting, threat groups will either move the conversation to another channel like WhatsApp, or simply pass a document like a job description or keynote speaker application to the target. From there, a payload is delivered to gain access to systems or intellectual property.
There are ways to sniff out scammers on LinkedIn, even when the message is targeted and more tailored:
Long story short, I blocked this account and reported the profile as LinkedIn phishing. As a cybersecurity professional, it’s funny thinking about the futility of the attempt. This was most likely a small-time phishing organization, with the way their profile and their messaging were set up.
Still, the experience is eye-opening all the same, because even poorly-written LinkedIn social engineering scams can snag unsuspecting people. Job seekers who are new to LinkedIn or others not savvy with security are particularly susceptible.
We as cybersecurity veterans should spread the word and take the time to educate any non-industry people around us. Social engineering leaves scars, sometimes across the data in your network, sometimes in your bank account. But it also leaves a much deeper scar on a victim’s sense of trust in people.
Don’t let these scammers take that from anyone you know.
(Read the original LinkedIn post here.)
If you are interested in learning more about the SafeGuard Cyber solution, you can take a quick 5-minute tour.