{"id":42861,"date":"2021-11-10T06:00:41","date_gmt":"2021-11-10T11:00:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=42861"},"modified":"2021-11-10T06:00:41","modified_gmt":"2021-11-10T11:00:41","slug":"linkedin-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/linkedin-phishing\/42861\/","title":{"rendered":"Fake LinkedIn notifications"},"content":{"rendered":"<p>Have you disabled annoying e-mail notifications from social networks? We think that\u2019s great! We even periodically offer <a href=\"https:\/\/www.kaspersky.com\/blog\/8-steps-to-freedom-from-social-media\/42632\/\" target=\"_blank\" rel=\"noopener nofollow\">advice on how to cut down on digital noise<\/a>. But LinkedIn is a special case. People really do expect messages from the social network for professionals \u2014 one could be from a prospective employer or business partner, after all. But a message from LinkedIn might just as easily come from a scammer pretending to represent a legitimate company. In this post, we\u2019re taking apart some phishing e-mails masquerading as LinkedIn notifications.<\/p>\n<h2>\u201cI am a bussinessman and am interested in doing business with you\u201d<\/h2>\n<p>On the face of it, this type of e-mail looks like a typical partnership proposal. It includes the photo, position, and company name of the potential \u201cpartner,\u201d and even a LinkedIn logo. The message is too short, though, and one might expect the word \u201cbusinessman\u201d to be spelled correctly in a legitimate message. You may also see that the message came from \u201cLinkediinContact\u201d \u2014 note the extra \u201ci\u201d \u2014 and the sender\u2019s address has nothing to do with LinkedIn.<\/p>\n<div id=\"attachment_42869\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074349\/linkedin-phishing-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42869\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074349\/linkedin-phishing-1.jpg\" alt=\"E-mail purportedly from LinkedIn proposing cooperation with an Arab businessman\" width=\"1000\" height=\"600\" class=\"size-full wp-image-42869\"><\/a><p id=\"caption-attachment-42869\" class=\"wp-caption-text\">E-mail purportedly from LinkedIn proposing cooperation with an Arab businessman<\/p><\/div>\n<p>The link in the e-mail leads to a website that looks similar to the real LinkedIn login page.<\/p>\n<div id=\"attachment_42868\" style=\"width: 1350px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074342\/linkedin-phishing-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42868\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074342\/linkedin-phishing-2.jpg\" alt=\"Phishing LinkedIn login page\" width=\"1340\" height=\"800\" class=\"size-full wp-image-42868\"><\/a><p id=\"caption-attachment-42868\" class=\"wp-caption-text\">Phishing LinkedIn login page<\/p><\/div>\n<p>But the URL is far removed from LinkedIn\u2019s, and the domain is the Turkish .tr, not .com. If the victim enters their credentials on this site, the account will soon be in the hands of the scammers.<\/p>\n<h2>\u201cPlease send me a qoute\u201d<\/h2>\n<p>A similar case is this message seemingly from an importer in Beijing, asking for a quote for the delivery of goods. The notification looks convincing; the message footer includes links to view help and unsubscribe from notifications, a copyright notice, and even the actual postal address of LinkedIn\u2019s China office. Even the sender\u2019s address looks like the real deal. Nevertheless, we see some red flags.<\/p>\n<div id=\"attachment_42867\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074335\/linkedin-phishing-3.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42867\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074335\/linkedin-phishing-3.jpg\" alt=\"E-mail purportedly from LinkedIn in which a Chinese buyer requests a quote. The sender's address looks clean, but that doesn't mean everything's in order\" width=\"840\" height=\"730\" class=\"size-full wp-image-42867\"><\/a><p id=\"caption-attachment-42867\" class=\"wp-caption-text\">E-mail purportedly from LinkedIn in which a Chinese buyer requests a quote. The sender\u2019s address looks clean, but that doesn\u2019t mean everything\u2019s in order<\/p><\/div>\n<p>For example, an article is missing in front of the word \u201cmessage\u201d in the subject line. The author may not speak fluent English, but the platform generates the subject of LinkedIn notifications automatically, so the subject can\u2019t contain errors.<\/p>\n<p>If you smell a rat and do a search for the company (UVLEID), you won\u2019t find it because it doesn\u2019t exist. And most important, the links in the e-mail point to a suspicious address in which random words, numbers and letters have been added to the name of the social network. The domain is again wrong, as well. This time it\u2019s .app, which app developers use.<\/p>\n<div id=\"attachment_42866\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074328\/linkedin-phishing-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42866\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074328\/linkedin-phishing-4.jpg\" alt=\"The button points to a phishing site\" width=\"840\" height=\"730\" class=\"size-full wp-image-42866\"><\/a><p id=\"caption-attachment-42866\" class=\"wp-caption-text\">The button points to a phishing site<\/p><\/div>\n<p>The \u201cLinkedIn login page,\u201d which the link opens, has issues: a blue square covering part of the last letter in the logo, and Linkedin instead of LinkedIn (under the username and password fields).<\/p>\n<div id=\"attachment_42865\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074304\/linkedin-phishing-5.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42865\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074304\/linkedin-phishing-5.jpg\" alt=\"arefully check the URL of the site and the name of the social network\" width=\"1200\" height=\"800\" class=\"size-full wp-image-42865\"><\/a><p id=\"caption-attachment-42865\" class=\"wp-caption-text\">arefully check the URL of the site and the name of the social network<\/p><\/div>\n<h2>\u201cYou appeared in 2 search this week\u201d<\/h2>\n<p>Links in fake notifications don\u2019t always open fake login pages \u2014 sometimes they can lead to more unexpected places. For example, this message saying that the recipient\u2019s profile has been viewed twice \u2014 common information for LinkedIn users to see \u2014 obviously uses bad English, but even if you miss that, a few other details should catch your attention:<\/p>\n<div id=\"attachment_42864\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074219\/linkedin-phishing-6.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42864\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074219\/linkedin-phishing-6.jpg\" alt=\"Unknown sender address and link to a site in a Brazilian domain\" width=\"1000\" height=\"740\" class=\"size-full wp-image-42864\"><\/a><p id=\"caption-attachment-42864\" class=\"wp-caption-text\">Unknown sender address and link to a site in a Brazilian domain<\/p><\/div>\n<p>With this kind of deception, if the victim misses the strange set of letters in the sender\u2019s address or the Brazilian domain, they may well click the button and get to an unexpected site \u2014 in our case, a \u201chow to become a millionaire\u201d online survey. After a few redirects, we ended up at a form asking for contact information, including phone numbers. The scammers most likely use the collected numbers for <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-vishing\/40410\/\" target=\"_blank\" rel=\"noopener nofollow\">phone fraud<\/a>.<\/p>\n<div id=\"attachment_42863\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074144\/linkedin-phishing-7.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-42863\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/11\/09074144\/linkedin-phishing-7.jpg\" alt=\"Online survey with redirect for further data harvesting\" width=\"1200\" height=\"800\" class=\"size-full wp-image-42863\"><\/a><p id=\"caption-attachment-42863\" class=\"wp-caption-text\">Online survey with redirect for further data harvesting<\/p><\/div>\n<h2>How to tell if a message from a potential partner or employer is fake<\/h2>\n<p>Cybercriminals use phishing to steal accounts, personal data, and money, but that is no reason to stop using LinkedIn or other services. Instead, learn <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">how to guard against phishing<\/a>, and always keep these basic tips at the ready:<\/p>\n<ul>\n<li>Watch out for unexpected messages from well-known companies;<\/li>\n<li>Look for inconsistencies in the names and addresses of senders, as well as typos in links, the subject line, and the e-mail body;<\/li>\n<li>Check notifications using official apps or websites, and in the latter case, manually type in the address or open it from your bookmarks;<\/li>\n<li>Enter contact information, card numbers, or login credentials only after double-checking you are on the real site;<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a> that warns you of danger and blocks phishing and fraudulent sites.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.<\/p>\n","protected":false},"author":2598,"featured_media":42862,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[80,172,76,4250,240],"class_list":{"0":"post-42861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-fraud","9":"tag-linkedin","10":"tag-phishing","11":"tag-social-network","12":"tag-spam"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/linkedin-phishing\/42861\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/linkedin-phishing\/23618\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/linkedin-phishing\/19070\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/linkedin-phishing\/9567\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/linkedin-phishing\/25691\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/linkedin-phishing\/23751\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/linkedin-phishing\/23282\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/linkedin-phishing\/26409\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/linkedin-phishing\/25951\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/linkedin-phishing\/31877\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/linkedin-phishing\/10250\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/linkedin-phishing\/18070\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/linkedin-phishing\/18445\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/linkedin-phishing\/15507\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/linkedin-phishing\/27713\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/linkedin-phishing\/31946\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/linkedin-phishing\/27816\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/linkedin-phishing\/24553\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/linkedin-phishing\/29933\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/linkedin-phishing\/29737\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=42861"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42861\/revisions"}],"predecessor-version":[{"id":42894,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/42861\/revisions\/42894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/42862"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=42861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=42861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=42861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}