“Accepting a LinkedIn invitation from someone you don’t know can lead to a data breach.” While tracking a suspected Iran-based cyber-threat group known as Threat Group 2889, Dell SecureWorks’ CTU uncovered an extensive network of fake LinkedIn profiles, which has been created to help the threat actors target potential victims through social engineering. Tim Erlin, director of security and product management at Tripwire said these convincing profiles form a self-referenced network of 25 seemingly established LinkedIn users.
[su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire :
“A believable social media presence is the modern equivalent of looking serious and carrying a clipboard. It opens doors through ‘soft authentication.’
Accepting a LinkedIn invitation from someone you don’t know may seem like no big deal, but it can lead to a data breach.
We often talk about sophisticated malware, but this type of social media engineering is integral to the most sophisticated kinds of attacks.”[/su_note][su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.