(Replying to PARENT post)

Two points to highlight from this article:

1. LinkedIn is an absolute godsend for bad guys, allowing easy targeting of everyone in the company with spear phishing emails and texts. I know many security professionals no longer use their real name, and don't list the real name of their company, because they know it's such a great hacking vector. Not sure what/whether LinkedIn can do anything about this.

2. I wish there were more information about what the vulnerability was in the PDF in the first place. I think a lot of people would be wary of downloading a PDF from a stranger, but not from someone who you had multiple interview rounds with and who offered you a job.

πŸ‘€hn_throwaway_99πŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

The main problem was using a machine that had access to half a billion dollars to also browse the web and do stuff like applying for jobs.

If you're gonna have access to such amount of money, it's worth buying a dedicated machine and using it very, very cautiously.

πŸ‘€rmbyrroπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

> LinkedIn is an absolute godsend for bad guys

I am listed as the Principal on a couple of companies, and get constant approaches that are obviously fake (like an attractive young "stewardess" from Dubai, who just happened to like my picture (which is actually my logo)).

I've given up reporting them, as LI always responds with "This is not in violation..."

πŸ‘€ChrisMarshallNYπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Personally I don't update my LinkedIn until I start looking for a new job. There is absolutely no need for anyone to know where I work (or at least for me to share that far and wide publically) and I'm not interested in cold emails/cold linkedin messages.

My decision was cemented in 2020 when someone who didn't like a tweet of mine retweeted it to my old company's twitter account trying to get me fired/reprimanded (The tweet in question called out my local PD for a dubious tweet they made, the person who tried to get me in trouble lived in a different state 12+ hours away). Thankfully my current company wouldn't have cared but there is no need to give people ammo.

πŸ‘€joshstrangeπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Most PDF "attacks" in the real world are very unsophisticated. One of the most common uses of PDFs in a phishing context is just as a way to deliver a link that would likely result in blocking by email security products (many don't inspect inside PDFs, and even for those that do the PDF format is complicated enough that it offers tremendous opportunities for obfuscation). I would wager money that the "PDF attack" involved here was as simple as a link to a malicious executable presented in a PDF to avoid detection by email filtering... in my time as a security analyst this was the #1 source of real compromise incidents, and anecdotally it seems to remain popular today based on the number of such PDFs I receive in my spam email.

The PDF format presents many opportunities for other exploits, either obfuscating a payload or running code, but modern PDF viewers are locking these opportunities down to such a degree that they are not very reliable (most of all because it is difficult to know which PDF viewer your target will use, and many popular PDF viewers today like pdf.js are relatively feature-incomplete which is a significant security advantage in this case). It's possible that something more sophisticated was going on but I would be very surprised if it was anything more complex than using the PDF as an obfuscated transport for a binary packed in it and invoked by the user (e.g. by clicking a link in the PDF with a javascript target). Non-user-interaction PDF vulnerabilities exist but are increasingly hard to come by as there has been more than a decade of work on locking down PDF viewers and the situation has improved dramatically in that time.

Contrary to what people sometimes expect, highly organized groups (such as APTs) tend to stick to very basic, simple methods as much as possible, since they are relatively reliable. The use of recent vulnerabilities in a specific PDF viewer, for example, is high risk due to the likelihood of failure and the opportunities for analysis it presents (you will have to do custom development rather than using off-the-shelf tooling). This is the kind of thing that organized groups try to avoid as much as possible, subject to an ROI analysis. Or in other words, if putting a link to an EXE in a PDF still works, why would you bother with anything else?

πŸ‘€jcrawfordorπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I think one shouldn't discount the attack vector that is just working in the Crypto industry, especially when you're someone who works with startups rather than the big guys.

In the "Web2 Sector", it would be very easy IMO to snuff out a fictitious company. I've gotten a handful of "offers" in the past and you can see straight through them, because the company doesn't exist in real life and you can't find any info on it, huge red flag.

The problem with the "Web3 Sector" IMO is you have a bunch of upcomming players in the space that no one has heard of. Just like investors in Cryto, if you're a developer in the space, no doubt you are jockeying to join a project that might land you a 7-10 figure windfall at the end.

So if an unheard of company approached me, I would tell them to kick rocks. If a similar company approached someone in the "Web3 Sector", they might take it thinking it's an emerging opportunity. I'm sure this still happens with Startups but my gut says it's really bad in the Web3 space.

πŸ‘€_fat_santaπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Speaking of spear phishing:

When I was at lockheed we had an incident whereby a bunch of folks had attended some defense conference, and after the fact received emails from folks they had 'met' at the conference, something along the lines of

"Hey Bob, we met at the [defense] conference this last week and I wanted to be sure you had my contact info: malware-contact.vcf"

or some other payload.

This installed a very slow sprawling worm which would slowly trickle data out of lockheed to China.

It was not discovered for quite a while due to how slowly it operated, but someone had complained about machine performance and IT looked at the machine and discovered the worm... after removing it - this somehow sent a signal to China that they had been found and all the worms started to firehose as much as they could until egress was closed. At the time, all of Lockheeds 150,000 employees had just three egress points to the internet. They had to shut them all down to kill that worm.

πŸ‘€samstaveπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Some in the security community demonstrated this with Robin Sage, circa 2009: https://en.wikipedia.org/wiki/Robin_Sage

It introduces the idea of "transitive trust" where person A might not know person B but if the two have a bunch of contacts in common, the odds of A trusting B goes up. When there's a profile with tens or hundreds of shared connections, it looks real by all accounts.

I wrote about this is an intel gathering/attack vector way back in the day but it's 100x better now because connecting is second nature and people trust more now: https://caseysoftware.com/blog/open-source-intelligence-link...

πŸ‘€caseysoftwareπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I deactivated my LI after my last job search, it hasn't affected my life at all since then. I don't know why you need one at all most of the time. Even without one, I think it would be perfectly easy to get interviews at companies, most interviews I've done in the past have been the ones I got by just going to the company's website and applying directly anyway.
πŸ‘€Dig1tπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

On (1), I have seen employees get spear-phishing texts (Welcome X! This is the CEO of Y. I need you to do a small favor…) within hours of updating their LinkedIn. I assume there are robots crawling it constantly looking for fresh candidates for account takeovers or other scams.
πŸ‘€aaronharnlyπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

How usable is LinkedIn with a pseudonym? Is that a security industry only practice or could a regular dev get away with that too? I've always been shy about having a profile with my actual name but id consider one with a thin veil of anonymity.
πŸ‘€koofdoofπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Also, don't use a company device for personal business.

If you use your own device then do company work in a VM.

πŸ‘€secondcomingπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

It’s a shame too. In my experience LinkedIn has been great for job hunting, indeed et al. were worthless time sinks for me. I want to keep it just for the ability to job hunt and get results but as you said…it’s a risk too.
πŸ‘€BolexNOLAπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I see people posting things even on HN where its a link to a PDF and I don't click on them. I remember PDF being a leaky and buggy format whose interpreters were full of vulnerabilities. I don't click on PDFs.
πŸ‘€LegitShadyπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

> I wish there were more information about what the vulnerability was in the PDF in the first place.

Agreed, I thought that opening a read-only PDF was GRAS regardless of the application.

πŸ‘€ineptechπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I think one other thing that bears mentioning is that LinkedIn's reporting doesn't easily let you explain how someone is performing a scam. If you're diligent you can find the link somewhere where you can actually explain it but when you just "report" someone or a job the response from LinkedIn is usually "We didn't find anything indicating this is a scam" or similar.
πŸ‘€alexfromapexπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

One thing about LinkedIn that profoundly bothered me when it got popular was the fact that you were expected to share a photo on your profile. Back in the day, in the US, attaching a photo to a resume was a big no-no, but here was a new way of recruiting that circumvented that principle. I found it shocking how readily and eagerly people threw that convention out.
πŸ‘€hydroplaneπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I'm not sure this is Linkedin's problem to solve. They are just a directory.

I suppose they could add a phishing warning for messages sent on LinkedIn, but really it's an education problem, teaching people to identify what phishing emails look like and how to avoid them. This is a problem I've been working on since at least 2003, when we realized that the best way to prevent eBay account takeovers was teaching people what phishing is. We also identified that education is the hardest solution to achieve.

It's ironic that the security professionals are the ones hiding their identity, given that they are the best prepared to identify and avoid phishing emails.

πŸ‘€jedbergπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

> I know many security professionals no longer use their real name, and don't list the real name of their company, because they know it's such a great hacking vector. Not sure what/whether LinkedIn can do anything about this.

on the other hand I bet you could collect some interesting things by creating a few fake people as linkedin honeypots at FAANGs, and I would be very surprised in their infosec/netsec teams aren't already doing this.

or getting real people who opt-in to have their linkedin profile receive incoming scams, virus, trojans, phish links and pipeline them into the infosec/netsec team.

πŸ‘€walrus01πŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

This is hilarious.

People on LinkedIn, using a name sufficiently far enough away from their real name so as to not be able to be easily found, listing their security jobs with again, sufficiently far enough away org names.

Turtles all the way down.

πŸ‘€h4waiiπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I’ve gotten vague legal threats from competitors who just browsed linked in and searched who they maybe thought could make the change they wanted and emailed me.

They seemed to avoid contacting executives or senior staff… but instead targeted folks capable of maybe making the change they wanted, and maybe jr / low enough on the pole enough to panic and do it.

I’ve seen it happen three times now, pretty scummy IMO.

πŸ‘€duxupπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I removed my profile from LinkedIn 2 years ago because it was starting to get crazy; I got calls and emails from obvious scammers every day. The problem is that when I introduce myself, people always get suspicious of me not having a LinkedIn profile. Someone needs to reinvent a professional network.
πŸ‘€tluyben2πŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

Isn't the issue here that they used their work laptop or were on their work's internal network(VPN?) to "apply" for this job?

This is something I see/hear so often, people using work equipment/network to conduct their personal stuff. This, IMO, should not be allowed at all.

πŸ‘€bl_valanceπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I'm so confused by #2 as well.

If pdf is compromised, is it fixed? This seems like the kind of vulnerability that would ruin pdf's reputation permanently. It was the safe alternative to sending someone a .doc particularly because of it's limited functionality.

πŸ‘€elifπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

I only use titles such as 'Employee' 'Worker' 'Carbon Based Life Form'.. on Linkedin. It also significantly reduces the amount of spam and cold calls.
πŸ‘€kornholeπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

All social networks with thorough mappings create vulnerability because of the trust people have in each other.
πŸ‘€cyanydeezπŸ•‘3yπŸ”Ό0πŸ—¨οΈ0

(Replying to PARENT post)

The easy fix for (2) is to only view the PDF in the cloud (e.g., Google Docs).
πŸ‘€e40πŸ•‘3yπŸ”Ό0πŸ—¨οΈ0