• Skip to primary navigation
  • Skip to main content
S2 Grupo

Spanish Company Specialized in Cybersecurity

  • Company
    • About Us
    • Governing Bodies
    • CSR
    • Awards and Acknowledgments
  • Specialization
    • OT Industry
    • IT
    • OT Health
  • Solutions
  • R&D+I
  • Talent
  • News & Publications
  • Contact
  • facebook
  • twitter
  • instagram
  • linkedin
|
en arrow down
  • es
© 2023 S2 Grupo
Corporate

How do cybercriminals act on Linkedin?

19 Jul 2022

  • S2 Grupo has pointed out that organized international cybercrime groups use this social network to obtain money or data through cyber espionage.

  • Experts from the cybersecurity company have warned that there are currently numerous cases of phishing through LinkedIN.

  • The modus operandi of cybercriminals in this environment usually follows four steps: study of the victim, tailored approach, generation of trust and delivery of the malware.

Valencia, July 12, 2022.- The Valencian company S2 Grupo, specialized in cybersecurity as well as cyberintelligence and critical systems management, has warned that cybercriminals are increasingly active in social networks, such as Linkedin, which puts people and the environments in which they work in a vulnerable situation.

"The goal of cybercriminals is always the same, to get money or obtain data, because information is worth a lot of money. Many people think that phishing cases can only happen through phishing email, spoofing and malicious links, but this is not the case. This has become more sophisticated and we also find cases of phishing on LinkedIN, for example", explained José Rosell, managing partner of S2 Grupo.

"There are cybercrime groups such as the Korean Lazarus that, precisely, make intensive use of networks such as LinkedIN to generate a first contact with their victims. This requires us to take extreme precautions in the use of these social networks to avoid falling into their trap, which is often oriented towards cyber espionage", said Miguel A. Juan, managing partner of S2 Grupo.

The cybersecurity company's team of experts has pointed out that the modus operandi of these cybercrime groups is usually as follows:

  1. First, they make a study of the target profile. They analyze the victim in order to approach them "without suspicion". In this way, they study their interests, their environment, contacts, the company they belong to, etc.

  • The second step is to make a tailor-made approach. "With the victim studied, a message is sent or an initial tailored contact is made. For example, if my interests are X or my job is Y, depending on my profile, the approach will be appropriate to that job, interests, profile, etc. This will increase the chances of success," assured José Rosell.

  • Thirdly, trust is key. Cybercriminal groups initiate an exchange of seemingly innocuous messages to gain the victim's trust.

  • The fourth step is the delivery. Once contact has been established, and there is a certain degree of trust and confidence in the conversation, they take the opportunity to send a malicious code. This message may include attachments or links that allow the cybercriminal to take full control (for example, by deploying a RAT, software capable of spying on and monitoring the infected computer) or partial control (for example, by capturing valid credentials) of the victim.

More information: prensa@s2grupo.es

  • fb
  • tw
  • in
Related Articles
Show all →
Corporate
S2 Grupo receives the 1st Prize for Boosting Youth Employment
Read more →
Corporate
The risks in the use of USB jeopardize the cybersecurity of companies
Read more →
Corporate
The pandemic causes citizens to be more exposed than ever to cybercrime
Read more →

Follow us in our newsletter

Subscribe through your email to stay up to date

S2 Grupo
© 2023 S2 Grupo
  • Press Center
  • Legal Disclaimer
  • Privacy Policy
  • Cookie policy
S2 Grupo utiliza cookies propias y de terceros para permitir tu navegación, fines analíticos y para mostrarte publicidad personalizada en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Clica aquí para acceder a nuestra Política de Cookies. Puedes aceptar todas las cookies pulsando el botón “ACEPTAR” o configurar o rechazar su uso pulsando el Botón “CONFIGURAR”
ConfigurarAceptar cookies
Manage consent

Resumen de Privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
pll_language1 yearThe pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA6 monthsThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
cookielawinfo-checkbox-functional1 yearThe cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necesaria1 yearSet by the GDPR Cookie Consent plugin to store the user consent for cookies in the category "Necessary".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
SAVE & ACCEPT
Powered by CookieYes Logo