The Latest in IT Security

Pharma spam using LinkedIn again


We wrote a couple of times already about spams pretending to come from LinkedIn which advertise online pharmacy websites.

There is a new spam campaign which changed a bit the way the messages are presented to the users.

Now the emails pretend to come from “LinkedIn Co. Technical Support”, “LinkedIn Co. Administration” and from “LinkedIn Reminders”.

All emails use non spoofed email addresses and unique client IP addresses, which is a clear sign that the fraudster have a large botnet at their disposal to send the emails. The even more interesting fact is that almost all the domains which host the SMTP servers are on very dubious hosters, most of them in Russia (or Russian speaking countries). We have seen though also some German domains and IP addresses.

What does this mean, more exactly?

If we see a From email address which is different than the email address specified in the email’s headers, then the sender is spoofed (pretends to be someone it isn’t). In this case, we see exactly the same situation as if someone (real) sends an email address to somebody else – all headers match the textual form of the sender and recipient.

The scary thing is that there are so many unique SMTP servers. Usually, the cybercriminals are paying these servers with stolen credit cards so that they can’t be tracked.

Fortunately, it will take not very long until these domains will be blocked by real time blacklists.

As usual, we advise all our readers to not fall for such scams and delete the emails immediately.

Sorin Mustaca

IT Security Expert

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments