Cybersecurity researchers have highlighted a new phishing campaign that is spreading through private messages on social media, especially on LinkedIn. This method allows attackers to build trust with high-value individuals before compromising their systems. According to a report from ReliaQuest, the campaign uses malicious files delivered through the sideloading technique of dynamic link libraries (DLL), combined with open-source pen-testing Python scripts.
Don’t open your DMs from strangers, just in case
The strategy involves approaching victims through messages on LinkedIn, inducing them to download a self-extracting WinRAR file that, when executed, activates a chain of infection. In this process, several malicious components are extracted, where the execution of a PDF reader application triggers the malicious payload. This technique has become increasingly common among threat actors, as it allows them to conceal suspicious activities and evade detection.
Once the system is infected, attackers gain persistent remote access, allowing them to exfiltrate sensitive data and escalate privileges within the compromised network. ReliaQuest indicates that this activity is widespread and opportunistic, affecting various industries. The ease of use of legitimate tools and the abuse of social platforms highlight the growth of phishing attacks that go beyond traditional emails.

Previous experiences have shown that LinkedIn has been used for targeted attacks, with malicious actors posing as job opportunities. The lack of monitoring of private messages on these platforms presents a significant gap in organizational security postures, suggesting that companies should consider social media as a critical area of exposure to attacks and expand their defenses beyond the email-centric approach.




