Learn more about LinkedIn Smart Link Phish Campaigns

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Community Hub.

Microsoft Defender for Office 365 security research team has observed a rise in the LinkedIn Smart Link phishing campaign. LinkedIn Smart Links are used by LinkedIn business accounts to deliver content and track user content engagements through the LinkedIn Sales Navigator. A typical Smart Link uses the LinkedIn domain followed by a ‘code’ parameter with an eight-alphanumeric character ID that may contain underscores and dashes.  

However, malicious Smart Links can include other parts of information, such as obfuscated victim emails. Smart Links have proven to bypass security email gateways (SEGs) and other email security suites due to the link using a trusted domain. Threat actors are actively using Slinks in a new form of campaigns identified by Microsoft Defender for 365 Security Research team.  

It is important to note that slinks are not inherently malicious. They are a legitimate feature used by LinkedIn business accounts to track user engagement with content. However, as with any feature, they can be abused by threat actors to carry out phishing campaigns.  

Let us learn more on TPT (Tactics, Techniques and Procedure) behind these LinkedIn Smart link phishing campaigns.  

Following is the standard Slink format provided by the LinkedIn Sales Navigator.  

https://www.linkedin.com/slink 

From our LinkedIn Smart link campaign investigation, we observed that the smart links, instead of "scode" parameter containing alphanumeric characters, were containing obfuscated target emails. Upon clicking the malicious LinkedIn Smart Link, the user will be sent directly or through a series of redirects to the phishing website. The phishing kit will read the victim’s email from the Smart Link to autofill the malicious form, adding to the illusion of legitimacy that the victim has landed on the legitimate Microsoft sign-in page. 

 

Following are some of the popular brands that were impersonated by the LinkedIn Smart Link campaigns.  

DocuSign Campaign template  

SehrishKhan_0-1705989461836.png

 

 

Microsoft Impersonation Template 

SehrishKhan_1-1705989461840.png

 

 

SharePoint Campaign template 

SehrishKhan_2-1705989461843.png

 

 

The observed pattern from these Smart Link Campaigns are outlined below.  

  1. Emails employ a generic subject line to mimic benign behaviour  
  1. Email body features a single image with a LinkedIn Smart Link embedding.  
  1. Multiple redirections are employed before presenting the Phishing page to evade detection systems. 

 

Following are the insights the research team observed from the Smart Links campaign data from Nov ‘23 to Dec ‘23.  

SehrishKhan_1-1706738458273.png

 

 

 

SehrishKhan_2-1706738458275.png

 

 

SehrishKhan_3-1706738458277.png

 

Recommendations   

It is important to be vigilant and cautious while opening emails, especially those that contain links. It is advisable to verify the authenticity of the email and the sender before clicking on any links or downloading any attachments. Especially when commonly used brands are part of email body that triggers the uses to click on the URLs, the users need to pay extra attention on the logo, content, redirection and the final landing URL legitimacy. 

Organizations are highly recommended to use email security gateways like Microsoft Defender for Office 365 to reduce the exposure of such campaigns to their employees. Security teams are also recommended to train their users to stay resistant to such vulnerable emails by deploying advanced Simulation trainings through MDO attack and simulation capabilities.  

If you are already using MDO, we encourage your SOC/Security teams to report any such suspicious emails landing in the inboxes of your employees so that we can investigate in case of any policy overrides or sophisticated scenarios used by the threat actors.   

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.