Researchers from Avanan have shared details of how hackers are taking advantage of LinkedIn’s automatic URL shortening service to launch a new credential harvesting campaign.
In a blog post, the researchers shared an email that invited recipients to click on a LinkedIn shortened URL to enter missing details.
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.
“The URL (shortened to lnkd.in) passed through the LinkedIn short URL service, leading visitors across several redirects, landing on this phishing page,” the researchers note.
Citing a recent Check Point Research report that rated LinkedIn as the sixth most impersonated brand in phishing attempts around the world in Q2 2021, Avanan argues that the latest phishing scam can target any employee.
“Plus, more employees have access to billing and invoice information, meaning that a spray-and-pray campaign can be effective,” believes Avanan.
The use of URL shortening service in order to redirect recipients to a phishing page, isn’t exactly novel.
Earlier this year, investigating a malicious message sent via Facebook Messenger, CyberNews researchers uncovered a large-scale phishing campaign that used a URL shortening service to trick close to 500,000 Facebook users.
In fact, security researchers have long been advising users against clicking shortened URLs in instance messages, emails, and other forms of online communication from unfamiliar sources.