Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » LinkedIn phishing uses HTML file to steal credentials

LinkedIn phishing uses HTML file to steal credentials

2015/01/15

Softpedia - (International) A researcher with Symantec reported that a recent phishing campaign designed to harvest login credentials for professional networking service LinkedIn uses a modified HTML file that contains the legitimate code from LinkedIn's login page but instead redirects the information to the attackers running the campaign. The use of an HTML file prevents users from being protected by blacklists and also allows the attacker to use several techniques to avoid automatic phishing detection methods.

Source: http://news.softpedia.com/news/LinkedIn-Phishing-Uses-HTML-File-to-Steal-Credentials-470136.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:09