🎁 💸 Warren Buffett's Top Picks Are Up +49.1%. Copy Them to Your Watchlist – For FreeCopy Portfolio

Cyber spies use LinkedIn to hack European defence firms

Published 2020-06-17, 11:42 a/m
© Reuters. Man poses in front of on a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica
GD
-
RTN
-
RTX
-
LNKD
-

By Jack Stubbs

LONDON (Reuters) - Hackers posed as recruiters working for U.S. defence giants Collins Aerospace and General Dynamics (N:GD) on LinkedIn (NYSE:LNKD) to break into the networks of military contractors in Europe, cybersecurity researchers said on Wednesday.

The cyber spies were able to compromise the systems of at least two defence and aerospace firms in Central Europe last year by approaching employees with pseudo job offers from the U.S. firms, Slovakia-based cybersecurity firm ESET said.

The attackers then used LinkedIn's private messaging feature to send documents containing malicious code which the employees were tricked into opening, said Jean-Ian Boutin, ESET's head of threat research.

ESET declined to name the victims, citing client confidentiality, and said it was unclear if any information was stolen. General Dynamics and Collins Aerospace, which is owned by Raytheon (NYSE:RTN) Technologies (N:RTX), declined immediate comment.

ESET was unable to determine the identity of the hackers but said the attacks had some links to a North Korean group known as Lazarus, which has been accused by U.S. prosecutors of orchestrating a string of high-profile cyber heists on victims including Sony Pictures and the Central Bank of Bangladesh.

North Korea's mission to the United Nations in New York did not immediately respond to a request for comment.

The attacks are not the first time LinkedIn has been caught up in international espionage. Western officials have repeatedly accused China of using fake LinkedIn accounts to recruit spies in other countries, and multiple hacking groups have been spotted using the business-networking site to profile their targets.

But ESET's Boutin said hacking attempts are usually conducted via email. "This is the first case I am aware of where LinkedIn was used to deliver the malware itself," he said.

© Reuters. Man poses in front of on a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica

LinkedIn said it had identified and deleted the accounts used in the attacks. "We actively seek out signs of state-sponsored activity on the platform and quickly take action against bad actors," said the company's head of trust and safety, Paul Rockwell.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.