Not only Zeus, but Bugat Trojan also spread during the LinkedIn attack.

  /     /     /  
Publicated : 06/01/2025   Category : security


LinkedIn Attack also Spread Bugat Trojan - Not Just Zeus

What is the Bugat Trojan?

The Bugat Trojan, also known as Dridex, is a type of banking malware that is designed to steal sensitive information, such as banking credentials, from infected computers. It is typically distributed through phishing emails and exploit kits, and once installed on a system, it can silently monitor user activity and intercept sensitive data.

How was the Bugat Trojan spread through the LinkedIn attack?

The Bugat Trojan was spread through the LinkedIn attack by exploiting a vulnerability in the LinkedIn platform that allowed attackers to inject malicious code into user profiles. This code would then redirect users to a fake LinkedIn login page, where their credentials would be harvested by the Bugat Trojan.

Were any other types of malware involved in the attack?

Yes, in addition to the Bugat Trojan, the attack also involved the distribution of Zeus, another infamous banking Trojan. Zeus is known for its ability to steal financial information, such as online banking credentials and credit card details, and it is often used in targeted attacks against financial institutions and other high-value targets.

People Also Ask

Here are some frequently asked questions related to the LinkedIn attack and the spread of the Bugat Trojan:

What were the consequences of the attack?

The consequences of the attack were severe, as it resulted in the theft of sensitive information from thousands of LinkedIn users. This included personal data, login credentials, and financial information, which were subsequently used for fraudulent purposes.

How did LinkedIn respond to the attack?

LinkedIn responded to the attack by quickly identifying and removing the malicious code from affected user profiles. They also issued a security advisory to all users, urging them to change their passwords and enable two-factor authentication to prevent further unauthorized access to their accounts.

What can users do to protect themselves from similar attacks in the future?

To protect themselves from similar attacks in the future, users should always be cautious when clicking on links or downloading attachments from unknown sources. They should also regularly update their software and use reputable antivirus programs to detect and remove any malware that may be present on their systems.


Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Not only Zeus, but Bugat Trojan also spread during the LinkedIn attack.