Cybersecurity (opens in new tab) researchers have caught hold of attackers using LinkedIn (opens in new tab)’s shortened URLs in phishing (opens in new tab) campaigns in order to trick email apps as well as the victims.
Researchers from Avanan have shared details of how hackers are taking advantage of LinkedIn’s automatic URL shortening service to launch a new credential harvesting campaign.
In a blog post (opens in new tab), the researchers shared an email that invited recipients to click on a LinkedIn shortened URL to enter missing details.
- Shield yourself with these best identity theft protection services (opens in new tab)
- These are the best email hosting providers (opens in new tab)
- Also check our list of the best email clients (opens in new tab)
“The URL (shortened to lnkd.in) passed through the LinkedIn short URL service, leading visitors across several redirects, landing on this phishing page,” the researchers note.
Brand hijack
Citing a recent Check Point Research (opens in new tab) report that rated LinkedIn as the sixth most impersonated brand in phishing attempts around the world in Q2 2021, Avanan argues that the latest phishing scam can target any employee.
“Plus, more employees have access to billing and invoice information, meaning that a spray-and-pray campaign can be effective,” believes Avanan.
The use of URL shortening service in order to redirect recipients to a phishing page, isn’t exactly novel.
Earlier this year, investigating a malicious message sent via Facebook Messenger, CyberNews researchers (opens in new tab) uncovered a large-scale phishing campaign that used a URL shortening service to trick close to 500,000 Facebook users.
In fact, security researchers have long been advising users against clicking shortened URLs (opens in new tab) in instance messages, emails, and other forms of online communication from unfamiliar sources.
- Protect your devices with these best antivirus software (opens in new tab)