Description

LinkedIn's Smart Links feature has once again become a tool for hackers in phishing attacks, with the primary objective of stealing Microsoft account credentials. Smart Links, typically used within LinkedIn's Sales Navigator service for marketing and tracking purposes, allow business accounts to share content through trackable links. These links are characterized by LinkedIn's domain and an eight-character code parameter, giving them an appearance of trustworthiness that can potentially bypass email security measures. This misuse of Smart Links is not a new phenomenon, having first been identified in late 2022. However, on October 11, 2023, cybersecurity firm Cofense reported a significant surge in such attacks, detecting over 800 phishing emails that led recipients to various deceptive web pages. These incidents occurred between July and August 2023 and made use of 80 different Smart Links. The attacks were launched from newly created or compromised LinkedIn business accounts. The recent campaign's targets cut across various sectors, including finance, manufacturing, energy, construction, and healthcare. Notably, while the finance and manufacturing sectors were heavily targeted, it appears that this campaign aimed to collect as many credentials as possible rather than concentrating on a specific industry or business. The phishing emails utilized a variety of subjects, including payments, human resources, documents, and security notifications. These emails contained embedded links and buttons that initiated a series of redirects through LinkedIn Smart Links, which gave the appearance of being trustworthy. To further enhance the illusion of authenticity, the Smart Links were modified to include the victim's email address, which was then auto-filled on the fraudulent Microsoft login page. The phishing page mimicked a standard Microsoft login portal, a strategy that could broaden its impact but might deter individuals familiar with their company's specific login procedures.