LinkedIn exploit 'left millions exposed' to malware

Check Point research highlights now patched vulnerabilities in LinkedIn's messaging service

LinkedIn on a mobile device

Exploits in LinkedIn's own security measures potentially allowed hackers to spread malicious files across the social networking site and infect millions of user PCs, it has been claimed.

The Microsoft-owned professional networking site, that boasts over 500 million users in 200 countries, allows members to chat, share CVs and send job descriptions to others in their network using a messenger service.

Multiple vulnerabilities were identified in LinkedIn's own security measures that are designed to restrict the types of files that are uploaded to LinkedIn's chat windows, according to security researchers at Check Point.

Typically these measures allow only a handful of extensions including pdf, text documents and jpegs, however, it was discovered that attackers could bypass these checks by uploading malicious files masquerading as accepted extensions. These were then capable of spreading throughout a user's network of contacts and infect any PCs connecting to those accounts.

The research identified four exploits in the LinkedIn security systems, including a limitation that failed to identify a malicious Power Shell script that was saved as a .pdf, which if downloaded, would remain undetected on a user's PC.

How a link may have appeared in a user's chat window

The Power Shell script made to masquerade as a .pdf file

The system was also unable to detect malicious Excel XLSM macros, disguised with an accepted .xlsx extension, which when uploaded would bypass the antivirus checks and be sent unnoticed to a user.

These types of attacks meant hackers could infect a user's PC with whatever code they wished, potentially stealing personal information, encrypting data, or hijack a machine for the purpose of spreading malware to other PCs.

Although there is no evidence that the vulnerabilities had been noticed and exploited by hackers, it serves to highlight the importance of robust security measures on a site that allows its millions of users to share files with each other.

Check Point notified LinkedIn of the vulnerabilities earlier this year, and they have since been acknowledged and patched as of the 24 June.

Main image: Bigstock - body images courtesy of Check Point.

Featured Resources

Five lessons learned from the pivot to a distributed workforce

Delivering continuity and scale with a remote work strategy

Download now

Connected experiences in a digital transformation

Enable businesses to meet the demands of the future

Download now

Simplify to secure

Reduce complexity by integrating your security ecosystem

Download now

Enhance the safety and security of your people, assets and operations

Enable a true vision of security with an engineered solution based on hyperconverged and storage platforms

Download now

Recommended

'Largest ever' Magecart hack compromises 2,000 online stores
hacking

'Largest ever' Magecart hack compromises 2,000 online stores

15 Sep 2020
'NetWalker' ransomware explodes thanks to 'as a service' expansion
ransomware

'NetWalker' ransomware explodes thanks to 'as a service' expansion

4 Sep 2020
Infocyte integrates with Palo Alto Networks Cortex XSOAR
cyber security

Infocyte integrates with Palo Alto Networks Cortex XSOAR

19 Aug 2020
Malware attacks using machine identities doubled in 2019
cyber security

Malware attacks using machine identities doubled in 2019

4 Aug 2020

Most Popular

Accenture ploughs $3 billion into cloud migration support group
digital transformation

Accenture ploughs $3 billion into cloud migration support group

17 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google Pixel 4a review: A picture-perfect package
Google Android

Google Pixel 4a review: A picture-perfect package

18 Sep 2020