ReliaQuest Threat Research ne LinkedIn par ek new phishing campaign ki pehchaan ki hai jo professional ko galat files download karne ke liye dhokha deta hai. dll side-loading ka istemaal karke, attacker security ko Bypass karne ke liye asli pdf readers aur python scripts ke andar virus chhipaate hain.
Building Trust to Deploy Trojans
yoonit ki jaanch ke mutaabik, yeh attack computer virus se nahin, balki batacheet se shuroo hota hai. hackers bharosa banane ke liye unche level ke logon se baat karne mein samay bitaate hain. researcher ne blog post mein bataaya ki jab target ko aaram mahasoos hota hai, to ataikar "unhen ek khatarnak WinRAR self-extracting archive download karne ke liye dhokha deta hai, jo asal mein ek digital folder hota hai jo apne aap khul jaata hai."
A Pattern of Side-Loading Attacks
yah LinkedIn campaign hackers ke aslee software mein herapher karne ke ek bade trend ka hissa hai. PDFSIDER backdoor tha, jise Resecurity ne tab khoja jab ek fortune 100 Company ko pdf24, jo ek popular office app hai, ke modified version ka istemaal karke target kiya gaya tha. lagbhag usi samay, Acronis ke researcher ne paaya ki hackers US-Venezuela tensions ki khabron ka istemaal karke sarakaree groups ko target kar rahe the taaki ek music player ke andar chhipa hua LOTUSLITE malware, deploy kiya ja sake.
The Human Element
ye hamle isliye safal hote hain kyon ki inke liye kisi fancy ya mushkil code ki zarurat nahin hoti aur ye insani jigyasa aur open-source tools ke istemaal par nirbhar karte hain jinhen company aasani se block nahin kar saktin. social media platform par abhi hamare email inbox ko surakshit rakhane vaale bhaaree security philtar nahin hain, jisse zyadatar bussinesses ke liye ek blaind spot ban jata hai.
