![]() When the victims opened the fake job offers, they unknowingly initiated the surreptitious installation of the fileless backdoor “more_eggs”. LinkedIn candidates received malicious ZIP archive files with the name of the victims’ job titles on their LinkedIn profiles. Less than a month ago, a new spear-phishing campaign started to target professionals on LinkedIn with a sophisticated backdoor trojan called "more_eggs" concealed in a job offer. ![]() Threat actors leverage this tactic to insert hard-to-detect malware into shortcut files (LNK files), manipulating a reliable application into becoming a perilous threat. ![]() The more discreet the malware, the harder it is to detect and remove. How malware can be hidden in LNK files and how organizations can protect themselves.Ĭybercriminals are always looking for innovative techniques to attack security defenses.
0 Comments
Leave a Reply. |