Stay alert Security Researchers as Fake Recruiters send you invitation on LinkedIn

 

 a fake invitation on LinkedIn   
A report published in Security Week confirms that LinkedIn accounts of security researchers across the globe have been recently assaulted with recruitment requests from a series of fake accounts in what appears to be an attempt to map their networks.
Sabari Selvan, Senior Researcher at Cyber Security and Privacy Foundation, has received a fake LinkedIn invitation from Jannine Viray who asked him to send his updated resume to jannine.viray[at]v-key.com as her company needed a mobile security researcher.
It is said that the targeted security professionals might receive multiple recruitment invitations per day. from Talent Sources’ supposed employees over the course of several days, yet they might want to steer clear of them.

The fake recruiters keep an attractive woman’s picture in the profile to attract the people. However, soon after the account details and the picture are changed, provided that the profile does not disappear entirely.
However, they used legitimate logo, copied from a real business, that its Twitter account hasn’t been updated since January, that it uses and egg and only two tweets have been ever posted, and that some of the LinkedIn accounts in question have already disappeared.

According to the news report, another Fox-IT’s Yonathan Klijnsma raised a flag on this activity a few weeks back and explained the manner in which the so-called “recruitment” works, but could not offer specific details on the purpose of this type of activity.
F-Secure’s Sean Sullivan took a closer look at these accounts and discovered that they were all for people supposedly working for Talent Src (Talent Sources) and that each was seemingly focused on a particular type of specialist.

“The profile pictures of some of these so called recruiters were found to be flipped copies of images on Instagram and on some legitimate LinkedIn accounts, while their specialties and areas of interest were revealed to be at least questionable,” the report added.

In May 2014, cyber intelligence firm iSIGHT Partners outed a group of Iranian threat actors, who were found using more than a dozen fake personas on popular social networking sites to run a wide-spanning cyber espionage operation since 2011.

“These credible personas then connected, linked, followed, and “friended” target victims, giving them access to information on location, activities, and relationships from updates and other common content,” iSIGHT Partners said.

Leave a Reply

Your email address will not be published. Required fields are marked *