Fake LinkedIn Email Link to JAVA Security Bypass Zero-day Exploit
This is how the malicious fake LinkedIn e-mail looks:
From: John Smith - LinkedIn (syllabifiesrev6077 @sprintrefugees.com)
Join my network on LinkedIn
From John Smith (CEO at EZ Internet Solurions and Owner, EZ Internet Solurions)
There are a total of 5 messages awaiting your response. Go to InBox now.
This message was sent to firstname.lastname@example.org. Don't want to receive email notifications? Login to your LinkedIn account to Unsubscribe.
LinkedIn values your privacy. At no time has LinkedIn made your email address available to any other LinkedIn user without your permission. c 2013, LinkedIn Corporation.
The aim of this e-mail message is to, trick the victims into clicking on the links in it, which will take them to the malicious website: http://www.greetingsexperiencedone .asia/. A webpage on this website was created with a malicious Java Applet code to download malicious programs on to the victim's customer.
Please note that, you may receive other fake e-mails impersonating other legitimate websites and organizations.
If you receive the notification in your web browser below, prompting you to run the Java Add-On, please close that browser window.
For information about the JAVA Security Bypass Zero-day exploit, click here.
Check the comment section below for additional information, share what you know or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Click here help maintain Online Threat Alerts (OTA).
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
NB: We will use your IP address to display your approximate location to other users.
Recommendations / Ads