LinkedIn Zeus spam run targets prospective business marks
Cybercrooks on Tuesday targeted users of the LinkedIn social network with a spam attack aimed at infecting victims with the infamous Zeus Trojan.
Prospective marks were emailed an alert link that posed as a social media contact request but actually sent victims to a malware-loaded site that attempted to infect users via a drive-by download attack. The onslaught of malicious spam targeting LinkedIn users accounted for 24 per cent of all junk mail for around 15 minutes after 11:00 UK time on Tuesday, according to network and security firm Cisco.
Cisco said the combination of a concentrated burst of attack lure emails, the focus on business users, and the use of the Zeus data-theft malware distinguishes the attack from other malicious email spam runs. The networking firm reckons the unknown miscreants behind the attack are probably targeting employees with access to financial systems and online commercial bank accounts.
More on the attack, along with a screenshot of a spam sample, can be found in a blog post by Cisco here.
Sponsored: Benefits from the lessons learned in HPC