Fake LinkedIn profiles promise prurient pics, send patsies malware instead Hackers have seeded LinkedIn Corp.’s business networking service with bogus celebrity profiles that link to malicious sites serving up attack code, a security researcher said today.Unlike Twitter, which had nearly three-dozen legitimate accounts hijacked on Monday, LinkedIn was not compromised. Instead, criminals used the service to create phony profiles, gave them celebrities’ names and slapped on the word “nude” to further entice users. The celebrities named included singer Beyonce and actresses Christina Ricci, Kirsten Dunst and Kate Hudson.The identical profiles all sported links to sites that promised nude photographs of the celebrities, said Paul Ferguson, a threat researcher at security vendor Trend Micro Inc. Users who clicked on those sites were shunted to sites hosting malicious software.“They’re using the same mechanism as have earlier e-mail spam campaigns, telling users that they have to install a codec,” said Ferguson. The coder/decoder is nothing of the sort, but actually a disguised Trojan horse. “They’re just casting a wider net using LinkedIn,” he said. LinkedIn reacted quickly, according to Ferguson, who said that the fake accounts first appeared on the site Tuesday. “Once they were notified, they quickly took them down,” he said. “There’s only a handful left when I last looked.”Rival security firm McAfee Inc. said yesterday that it had spotted “several hundred” bogus LinkedIn accounts. The recent criminal activity on social networking sites — Twitter was targeted with a first-ever major phishing campaign last week, for example — will only get worse, Ferguson predicted.“[Cybercriminals are] just trying to get more eyeballs on their handiwork,” he said, explaining why they are turning to social networks such as LinkedIn and Facebook, as well as the microblogging Twitter service. “There’s a black hat SEO [search engine optimization] element here, too, since sites like LinkedIn and Facebook often float to the top of search engine results,” said Ferguson.In fact, McAfee came to its count of fake LinkedIn accounts simply by searching Google.There’s not a lot security software can do for users who keep clicking on links that more than likely lead to malware, Ferguson acknowledged. “There’s always going to be that social engineering aspect,” he said. “People should know by now not to click on links that promise nude pictures.”LinkedIn did not immediately respond to questions about the fake accounts or say what it plans to do to prevent a recurrence. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe