LinkedIn Messages Spread RAT Malware

LinkedIn Messages Spread RAT Malware

Cybersecurity experts found a clever phishing trick. Hackers send private messages on LinkedIn. They target important people this way. Therefore, victims often trust the sender quickly.

Hackers pretend to be friendly contacts. They build trust fast. Then, they trick users into downloading a fake file. For example, the file looks like a normal WinRAR archive.

How the Attack Works Step by Step

The downloaded file is a self-extracting archive. It opens and pulls out four items. First, a real PDF reader program appears. Second, a bad DLL file hides inside. Third, a Python tool gets added. Fourth, a RAR file acts as a distraction.

When the user runs the PDF reader, trouble starts. The bad DLL loads quietly. This technique is called DLL sideloading. However, it fools security tools easily. Attackers love this method now.

What Happens After Infection

The sneaky DLL drops the Python interpreter on the computer. It also adds a startup key in the Windows Registry. Therefore, the Python tool runs every time the user logs in. Next, it pulls hidden code from memory. This code comes in Base64 format.

The code runs without saving files to disk. As a result, it leaves few traces behind. Finally, the malware talks to a hacker server. Attackers gain full remote control. They steal data too.

Why This Attack Succeeds Easily

Hackers use open-source tools that look normal. They mix them with bad code. For instance, the Python script comes from pen-testing resources. Moreover, LinkedIn messages skip email checks. Email systems often catch bad links. However, social media chats get less attention.

This campaign hits many industries. It spreads across different countries. Therefore, it feels broad and random. Experts say social platforms create big risks. Attackers bypass company defenses this way.

Similar Attacks in the Past

LinkedIn has faced misuse before. North Korean groups used fake job offers. They tricked people into running bad code. For example, victims thought they joined a test project. In another case, fake notifications lured clicks. Those led to remote control software downloads.

Social media remains a weak spot. Companies watch emails closely. However, private messages stay hidden. As a result, attackers choose this path more often.

How to Prevent These LinkedIn Phishing Attacks

Stay alert with every unexpected message on LinkedIn. Verify the sender before downloading anything. Never open files from unknown contacts. Train employees to spot social engineering tricks. Use strong monitoring for unusual downloads and startup changes.

Advanced threat detection helps catch sneaky malware early. Real-time alerts spot odd network traffic. Regular security checks find weak points fast. Combine employee awareness with 24/7 monitoring. Therefore, teams block attacks before damage grows. These steps reduce risks from social media phishing and DLL tricks.

Sleep well, we got you covered.

Scroll to Top