Warning! JavaScript is turned off or disabled! Some features on this website will not work.
Previous Next
»

Fake LinkedIn Email Link to JAVA Security Bypass Zero-day Exploit

 +
Fake LinkedIn Email Link to JAVA Security Bypass Zero-day Exploit

Here is a malicious e-mail that is trying to take advantage of the JAVA Security Bypass Zero-day exploit by impersonating popular professional networking website LinkedIn. The JAVA Security Bypass Zero-day exploit is a flaw that allows a malicious website, set up by a hacker, to infect your computer with malicious programs by just visiting the website.

Advertisements

This is how the malicious fake LinkedIn e-mail looks:

From: John Smith - LinkedIn (syllabifiesrev6077 @sprintrefugees.com)

Join my network on LinkedIn

LinkedIn

REMINDERS

Invitation reminders:

From John Smith (CEO at EZ Internet Solurions and Owner, EZ Internet Solurions)

PENDING MESSAGES

There are a total of 5 messages awaiting your response. Go to InBox now.

This message was sent to username@domain.com. Don't want to receive email notifications? Login to your LinkedIn account to Unsubscribe.

LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. c 2013, LinkedIn Corporation.

The aim of this e-mail message is to, trick the victims into clicking on the links in it, which will take them to the malicious website: http://www.greetingsexperiencedone .asia/. A webpage on this website was created with a malicious Java Applet code to download malicious programs on to the victim's customer.

Please note that, you may receive other fake e-mails impersonating other legitimate websites and organizations.

If you receive the notification in your web browser below, prompting you to run the Java Add-On, please close that browser window.

JAVA Security Bypass Zero-day Exploit SE Runtime Environment Oracle Update 11 America

For information about the JAVA Security Bypass Zero-day exploit, click here.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

Remember to help us, help you, by donating. 🎁Click here to donate

Advertisements
Comments, Questions and Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. And, when you post a comment or review, we will use your IP address to display your approximate location to other users.

 Show More Comments (0)
Write Your Comment, Question or Review
Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.