LinkedIn Spam Leading to Exploits

Tell the world!

“Join my network on LinkedIn” This was the subject of recent spam emails we received at the Defintel office, and the same subject we have legitimately seen many times before. However, Hussein Matar ( and Chip Eubank ( don’t actually share any connections with us. What they wanted to share was malware.

The messages themselves are formed fairly well and not entirely shady looking if you don’t quickly recall what a true LinkedIn request email looks like. Below is the fake:

Every link from Chip takes me to, which then directs to
The first domain appears to be a compromised site with a normally benign intent. just like many of the others used for the initial hosting of the “/templates/beez/wps.php?c002” and “/templates/beez/wps.php?pprec” links used in the spam campaign. Other sites include:
The second location at is hosting blackhole exploit kits and ZeroAccess malware. This domain is currently pointed to which it shares with, another site with the same exploits and malware. The destination URLs for the exploits part of this campaign vary some but commonly fall under the “closest” location:



Some malicious domains sharing these files:
Be wary of odd looking invitations and use your instincts. If it feels strange, then don’t click. Real LinkedIn invites come from ( and include personal information. LinkedIn addresses this very thing in their help center:

In our messages to you, we include a security footer message with your name and professional headline to help you distinguish authentic LinkedIn emails from “phishing” email messages. “Phishing” emails often look very similar to legitimate ones, but they likely wouldn’t have this personalized information and may also contain links that direct you to malicious sites instead of LinkedIn.

-Matt Sully
Additional info and sources:

Tell the world!

Leave a Reply

Your email address will not be published. Required fields are marked *