Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use LinkedIn messages to spread RAT malware through DLL sideloading
Identity

Hackers use LinkedIn messages to spread RAT malware through DLL sideloading

userBy userJanuary 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 20, 2026Malware/Threat Intelligence

LinkedIn messages spreading RAT malware

Cybersecurity researchers have discovered a new phishing campaign that exploits private social media messages to propagate malicious payloads. This is likely intended to deploy a remote access trojan (RAT).

ReliaQuest said in a report shared with The Hacker News that the activity delivers “weaponized files via dynamic link library (DLL) sideloading combined with legitimate open source Python penetration testing scripts.”

The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and tricking them into downloading a malicious WinRAR self-extracting archive (SFX). When the archive is launched, four different components are extracted.

Legitimate open source PDF reader applications Malicious DLLs sideloaded by PDF readers RAR files that can act as Python interpreter portable executable (PE) decoys

cyber security

The infection chain is activated when the PDF reader application is executed and the malicious DLL is sideloaded. The use of DLL sideloading is an increasingly common technique employed by threat actors to leverage legitimate processes to evade detection and hide signs of malicious activity.

Over the past week, at least three documented campaigns have utilized DLL sideloading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity Trojans and information thieves.

The campaign observed by ReliaQuest uses a sideload DLL to drop a Python interpreter onto the system and create a Windows registry Run key that allows the Python interpreter to run automatically on every login. The interpreter’s primary role is to execute Base64-encoded open source shellcode. This shellcode runs directly in memory, ensuring no forensic artifacts remain on disk.

The final payload attempts to communicate with an external server, giving the attacker persistent remote access to the compromised host and exfiltrating the desired data.

The misuse of legitimate open source tools and the use of phishing messages sent on social media platforms shows that phishing attacks are not limited to email, and that alternative delivery methods can exploit security gaps to increase the probability of success and penetrate corporate environments.

ReliaQuest told The Hacker News that the campaign appears to be broad-based and opportunistic, with activity spanning various sectors and geographies. “However, the overall scale of this activity is difficult to quantify as this activity is occurring via direct messages and social media platforms are typically not monitored as much as email,” it added.

“This approach allows attackers to evade detection and scale their operations with minimal effort while maintaining durable control over compromised systems,” the cybersecurity firm said. “Once compromised, they have the potential to escalate privileges, move across networks, and steal data.”

This isn’t the first time LinkedIn has been used for targeted attacks. In recent years, several North Korean threat actors, including those associated with the CryptoCore and Contagious Interview campaigns, have identified victims by contacting them on LinkedIn under the pretext of job opportunities and convincing them to run malicious projects as part of a supposed evaluation or code review.

cyber security

In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that used decoys related to LinkedIn InMail notifications to trick recipients into clicking the “Read More” or “Reply to” buttons and downloading remote desktop software developed by ConnectWise to take full control of the victim host.

“Social media platforms commonly used by businesses represent a gap in most organizations’ security posture,” ReliaQuest said. “Unlike email, where organizations tend to deploy security monitoring tools, private messages on social media lack visibility and security controls, making them an attractive delivery channel for phishing campaigns.”

“Organizations must recognize that social media is a critical attack surface for initial access and extend defenses beyond email-centric controls.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article€17 million GAMMA project to accelerate green transport
Next Article Indian vibecoding startup Emergent triples valuation to $300 million with $70 million funding
user
  • Website

Related Posts

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Everything you need to know about the viral personal AI assistant Clawdbot (now Moltbot)

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.