chat
expand_more

LinkedIn Impersonated in Identity Theft Scheme

In a recent attack uncovered by Abnormal Security, the attacker impersonates LinkedIn to send a malicious attachment that could lead to identity theft. Once the attachment is opened, the victim is asked to put in personal identifying information, including their social security number.
January 27, 2021

In a recent attack uncovered by Abnormal Security, the attacker impersonates LinkedIn to send a malicious attachment that could lead to identity theft. Once the attachment is opened, the victim is asked to put in personal identifying information, including their social security number.

Summary of Attack Target

Abnormal Security first observed this attack targeting one of our customers.

  • Platform: Office 365
  • Victims: Executives and VIPs
  • Payload: Malicious Attachment
  • Technique: Name Impersonation

LinkedIn Impersonated in Original Attack

In this attack, the recipient receives an email from what appears to be LinkedIn, at least according to the display name. The email contains only an HTM attachment named “PolicyChange2845,” prompting the recipient to open the file. At first glance, the recipient may think that this is a policy change notification coming from LinkedIn. The email subject states “Changes that affect you,” increasing the urgency to open the attachment.

However, when taking a closer look, we can see that while the display name is LinkedIn, the actual sending email address is ‘policychange@fzx.com,’ which has no relation to LinkedIn. The attacker is using name impersonation in hopes of deceiving the recipient.

When opening the attachment, the recipient is asked to complete a form that looks similar to the LinkedIn login or sign-up page. This form contains boxes to input the recipient’s name, social security number, date of birth, and driver’s license number. Meanwhile, the legitimate LinkedIn site would only ask for an email and password to login.

If the recipient of this email falls victim to this attack and fills out the form they are prompted with, they will have released extremely sensitive information to the attacker. The attacker would not only have their name and date of birth, but also their social security number and driver’s license information—all of which can quickly lead to identity theft.

Why This Attack Bypassed Traditional Security

Because this attack does not contain a traditionally malicious attachment, it would likely bypass a secure email gateway that would look for malware hidden within the attachment. Instead, this attack uses urgency and credential phishing to encourage someone to open the attachment and complete the form.

By understanding identity and impersonation, Abnormal Security is able to detect the nature of the message and understands that it is likely dangerous—despite not containing malicious code. Further analysis of the text within the email also indicates that the body contains text and spaces with a size zero font, a common pattern that we've observed in email attacks.

Taken together, Abnormal has enough signals to mark this email as an attack, and prevent it from reaching end users.

Curious how Abnormal can stop name impersonation and prevent your end users from becoming victims of identity theft? Request a demo for a full overview.

LinkedIn Impersonated in Identity Theft Scheme

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B APAC Email Security Threats
Email attacks on APAC organizations, including phishing and BEC, are rising. See why AI-native email security is crucial to countering modern cyber threats.
Read More
B Proofpoint Customer Story 10
Learn how a multinational travel center services provider blocked 1,180+ attacks missed by Proofpoint and reclaimed 450+ SOC hours per month by adding Abnormal.
Read More
B Operating Curves Blog
Explore how operating curves help optimize system performance by visualizing competing metrics, making trade-offs, and achieving efficient resource allocation.
Read More
B SOC Traits
Discover the traits and mindsets that define top SOC analysts, as explored in Season 1 of SOC Unlocked.
Read More
B Punycode Problem Blog
Explore how threat actors exploit Punycode in email attacks and learn how AI-driven solutions can protect against these threats.
Read More
B Product24
Discover how Abnormal transformed 2024 with groundbreaking AI innovations, enhanced cloud and email security solutions, and industry leadership, tackling evolving cyber threats while empowering organizations worldwide to stay secure.
Read More