linkedin is a hacker\s dream tool
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today
Almaghrib Today, almaghrib today
Last Updated : GMT 09:03:51
Almaghrib Today, almaghrib today

LinkedIn is a hacker's dream tool

Almaghrib Today, almaghrib today

Almaghrib Today, almaghrib today LinkedIn is a hacker's dream tool

San Francisco - Arabstoday

If you use LinkedIn, you've probably told the site where you work, what you do and who you work with. That's a gold mine for hackers, who are increasingly savvy in using that kind of public -- but personal -- information for pinpoint attacks. It's called "spear phishing," and it paid off last year in two especially high-profile security breaches: a Gmail attack that ensnared several top U.S. government officials and a separate attack on RSA, whose SecurID authentication tokens are used by millions. In both cases, the attackers successfully tricked their targets into opening e-mail attachments that appeared to come from trusted sources or colleagues. Investigators haven't disclosed how the attackers gathered information on their victims, but at RSA's security conference last month, the risks of social networking sites -- and LinkedIn (LNKD) in particular -- were a hot topic. Dozens of presenters said the business networking site could be a potent weapon in the hacker toolkit. "Businesspeople are using LinkedIn for research purposes, and headhunters and marketers use it to recruit. Why wouldn't Chinese intelligence agents use it as well to spear phish?" said security analyst Ira Winkler, the author of "Spies Among Us." Most of the discussion about LinkedIn's risks was theoretical -- investigators say it's almost impossible to trace back the original source of personal data used in successful "social engineering" attacks. But in one arresting case study, self-described "hacker for hire" Ryan O'Horo demonstrated how he used LinkedIn to get inside a client's corporate network. O'Horo is a managing security consultant for IOActive, a services firm that offers vulnerability testing. His customer, a "high-profile company with tens of thousands of employees," had top-notch technical protections. "We needed to go to the next level," O'Horo said of his efforts to crack its network. O'Horo created a fake account on LinkedIn, posing as a company employee. He stocked the profile with realistic details -- a plausible job history and skill set -- plus a few credibility-establishing flourishes like a membership in a local hockey league. From his dummy account, O'Horo sent out 300 connection requests to current company employees. Sixty-six were accepted. Next, O'Horo requested access to a private LinkedIn discussion forum the company's employees had created. The group's moderators granted his request without ever checking a company directory to confirm his identity. "Now I had an audience of 1,000 company employees," O'Horo said. "I posted a link to the group wall that purported to be a beta test sign-up page for a new project. In two days, I got 87 hits -- 40% from inside the corporate network." O'Horo got caught just three days into his LinkedIn attack: An astute employee figured out he didn't belong and blew the whistle. But he'd already made his point. "They were definitely surprised that the group existed," O'Horo said of his client's response to his report. "It wasn't a formal company group; there was no oversight or policy covering that aspect of their social presence. The people in charge of their information security didn't know it was there." Hackers don't need anything so fancy as private discussion forums to take advantage of LinkedIn, though. The site's users openly display plenty of valuable data. At last summer's DefCon security conference, a group of "social engineering" hackers staged a game in which contestants attempted to trick employees at more than a dozen major companies -- including Apple (AAPL, Fortune 500), AT&T (T, Fortune 500), Calmar (WMT, Fortune 500) and United Airlines (UAL, Fortune 500) -- into disclosing sensitive corporate information. Next to Google (GOOG, Fortune 500), LinkedIn was the competitors' most widely used resource. Some people divulged specific technical information about their employer's infrastructure in their profiles, while others offered up details that could be used for stealth attacks. For example: If you can learn the name of a target's colleagues, it's fairly easy to fake an email that appears to come from one of them. LinkedIn says it urges users to think carefully about the information they choose to reveal. "We recommend members connect only with people that they know and trust," says company spokesman Richard George. "All Internet users should of course be aware of the fact that there are bad guys out there who unfortunately resort to things like phishing attacks, and that people should use common sense and tools available to them to ensure that they don't fall prey." LinkedIn's vulnerability, though, is inextricably tied to its growth. The site now has 150 million users -- almost twice as many as it had just one year ago. As its database grows richer, its value increases for both its members and those wishing to exploit them. Security researcher Rob Rachwald regularly monitors the chatter on sites and chat rooms where hackers meet to swap tips. LinkedIn's prominence there is rising, he says. To illustrate the point, he pulled up a scattering of recent messages from one online hub, HackForums.net. One posting solicited for someone to break into a target LinkedIn account, while others advertised "real LinkedIn connections" for sale. "Hackers go where people go," says Rachwald, the director of security strategy for software firm Imperva. "As Facebook grew, they went there. As LinkedIn grows, they're going there." To top of page

almaghribtoday
almaghribtoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

linkedin is a hacker\s dream tool linkedin is a hacker\s dream tool

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

linkedin is a hacker\s dream tool linkedin is a hacker\s dream tool

 



Almaghrib Today, almaghrib today Skincare PR Performance Full Year 2017

GMT 09:22 2018 Monday ,22 January

Skincare PR Performance Full Year 2017
Almaghrib Today, almaghrib today New hunt for flight MH370 gets under way

GMT 11:03 2018 Wednesday ,24 January

New hunt for flight MH370 gets under way
Almaghrib Today, almaghrib today Modern colorful bedroom renovation

GMT 10:57 2017 Thursday ,21 December

Modern colorful bedroom renovation
Almaghrib Today, almaghrib today Puigdemont candidate for Catalan president

GMT 13:56 2018 Tuesday ,23 January

Puigdemont candidate for Catalan president
Almaghrib Today, almaghrib today Turkey detains dozens more

GMT 10:47 2018 Wednesday ,24 January

Turkey detains dozens more

GMT 09:56 2016 Wednesday ,23 March

cartoon one

GMT 10:20 2016 Wednesday ,23 March

cartoon ten

GMT 10:18 2016 Wednesday ,23 March

cartoon seven

GMT 10:19 2016 Wednesday ,23 March

cartoon nine

GMT 10:22 2016 Wednesday ,23 March

cartoon thirteen

GMT 10:17 2016 Wednesday ,23 March

cartoon six

GMT 10:24 2016 Wednesday ,23 March

cartoon fifteen

GMT 09:58 2016 Wednesday ,23 March

cartoon three

GMT 10:21 2016 Wednesday ,23 March

cartoon eleven

GMT 10:16 2016 Wednesday ,23 March

cartoon five

GMT 10:23 2016 Wednesday ,23 March

cartoon fourteen

GMT 10:22 2016 Wednesday ,23 March

cartoon twelve

GMT 10:18 2016 Wednesday ,23 March

cartoon eight

GMT 09:58 2016 Wednesday ,23 March

cartoon four

GMT 09:57 2016 Wednesday ,23 March

cartoon two

GMT 07:38 2013 Tuesday ,17 September

Weleda unveils holistic haircare range

GMT 09:03 2016 Friday ,05 August

UC researchers probe how sunflowers move by clock

GMT 16:02 2013 Monday ,18 March

Red dot recognition for BMW
Almaghrib Today, almaghrib today
 
 Almaghrib Today Facebook,almaghrib today facebook  Almaghrib Today Twitter,almaghrib today twitter Almaghrib Today Rss,almaghrib today rss  Almaghrib Today Youtube,almaghrib today youtube  Almaghrib Today Youtube,almaghrib today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

.almaghribtoday .almaghribtoday .almaghribtoday .almaghribtoday
almaghribtoday almaghribtoday almaghribtoday
almaghribtoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
almaghribtoday, Almaghribtoday, Almaghribtoday