For the past several weeks an intelligence-gathering campaign has been using fake LinkedIn recruiter profiles to map out the professional networks of IT security experts, researchers from F-Secure have discovered.
LinkedIn can be a great tool to establish new professional relationships and discover job opportunities. However, accepting connection requests from unknown people is a double-edged sword that can put both employees and the companies they work for at risk.
There are multiple cases where attackers have used fake LinkedIn profiles to gather sensitive information about organizations and their employees. Knowing who is the manager of a particular department in a company or who is a member of the organization's IT staff can be very useful in planning targeted attacks.
In 2012, a team of security experts created a LinkedIn profile for a fake new female hire at a U.S. government agency as part of a sanctioned test. By befriending multiple employees and establishing relationships, the team raised the credibility of their fake identity and eventually gained enough information to launch a successful attack against the organization's IT security manager, who did not even have a LinkedIn or other social media account.
People tend to expose a lot of information on LinkedIn about their work environments, colleagues, the company's infrastructure and even internal projects.
An organization called the Transparency Toolkit used LinkedIn to collect over 27,000 resumes from people working in the U.S. intelligence community. By analyzing them, it uncovered new surveillance programs, secret code words, companies that help with surveillance and, of course, personal information about signals intelligence analysts.
The suspicious LinkedIn recruiting campaign that targets security researchers was first mentioned on Twitter on Aug. 18 by Yonathan Klijnsma, a threat intelligence analyst at Dutch security firm Fox-IT.
Researchers from Finnish antivirus firm F-Secure decided to look into it after some of the company's own staff were targeted. They published their findings in a blog post Thursday.
The F-Secure researchers found multiple LinkedIn accounts of people claiming to work for a company called Talent Src, or Talent Sources. The accounts, most of which were for female identities, appeared to belong to recruiters for particular security industry specialties like malware analysis, embedded security, mobile security, cryptography, automotive security or digital forensics. Two accounts were specifically hunting security executives.
Reverse image searches revealed that the logo used by Talent Src had been copied from a different organization and had the company name added to it.
The profile pictures used by the fake recruiters were also copied from Instagram or legitimate LinkedIn profiles, but had been horizontally flipped to make reverse image searching harder, the F-Secure researchers said.
At least one of the fake recruiters, using the name Jennifer White, had received endorsements from new connections for skills that she clearly did not have based on her listed work history.
Such endorsements can establish an account's credibility and make it easier for attackers to score additional connections.
A person who endorsed Jennifer White and who works at a large U.S.-based defense contractor admitted that it was "a bad habit to give out such endorsements without really knowing the other person," the F-Secure researchers said.
The people behind the fake recruiting accounts only keep the fake identities they create for about a week and then remove the profile pictures and change the names associated with the accounts.
It's not clear what their end goal is. The campaign could be part of a research project about social media risks that someone plans to disclose at a later time or could be the work of hackers looking to gather information they could use to build targeted attacks against security companies.
According to reports based on documents leaked by former U.S. National Security Agency Edward Snowden, the U.K.'s GCHQ used fake LinkedIn profiles to target network engineers from Belgian telecommunications operator Belgacom in the past.
Regardless of whether this new intelligence gathering campaign is malicious or not, the incident should serve as a reminder to employees everywhere that accepting connection requests from unknown persons on social media can be dangerous and so is detailing your existing work duties in online resumes.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.