Microsoft warns LinkedIn users of fake skills assessment portals

Those in IT and recruiting roles should watch out for unsolicited messages

John Leonard
clock • 2 min read
Microsoft warns LinkedIn users of fake skills assessment portals
Image:

Microsoft warns LinkedIn users of fake skills assessment portals

Microsoft has issued a warning about fake skills assessment portals being used in social engineering campaigns by a North Korean hacking group known as Sapphire Sleet.

Sapphire Sleet, which is part of the notorious Lazarus Group, has a history of stealing cryptocurrencies through scams and phishing attempts. The group typically finds targets on LinkedIn and initiates contact using lures related to skills assessments.

According to a series of posts on X, Microsoft, Sapphire Sleet has recently established new portals that impersonate recruiting and skills testing sites. The fake websites require users to register for an account, enabling the hackers to gather sensitive personal information and credentials.

The sites are hosted on malicious domains and are password-protected to avoid analysis. Microsoft has already blocked many of the known domains being used in these campaigns.

Microsoft believes the shift to fake skills assessment portals may indicates Sapphire Sleet has changed direction due to the quick detection and take-down of their previous malicious attachments and links.

Sapphire Sleet is now specifically targeting LinkedIn users based on their expertise and experience. The initial outreach contains links to the fraudulent sites disguised as legitimate skills tests.

Microsoft advises LinkedIn users, especially those in IT and recruiting roles, to be cautious of unsolicited messages containing links or skill assessment offers. Users should verify the authenticity of any websites before providing login credentials or sensitive information.

Lazarus, also known as Hidden Cobra, became widely known in 2014 when it hacked Sony Pictures over the film The Interview, a comedy centring on the assassination of North Korean leader Kim Jong-un. It is believed to be closely connected to the North Korean government.

Later the group turned its attention to cryptocurrency thefts, and was thought to have stolen roughly $400 million in cryptocurrency in 2021.

It is also blamed for the Ronin hack in March 2022, which resulted in the theft of more than $600 million in ethereum and USDC stablecoins.

You may also like
CMA invites comments on Microsoft-OpenAI partnership

Government

Regulator investigating the potential of a merger

clock 11 December 2023 • 3 min read
The Bank of England proposes new rules to curb reliance on big tech

Legislation and Regulation

Overreliance 'could impact UK financial stability if they were to fail or be disrupted'

clock 08 December 2023 • 1 min read
If ChatGPT is an 'iPhone moment' how should IT leaders respond?

Leadership

'How do we grow and scale this?'

clock 08 December 2023 • 4 min read
Most read
Upcoming events

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Hacking

Data breach affects nearly 7 million 23andMe profiles

Data breach affects nearly 7 million 23andMe profiles

Data including family trees and birth years have been stolen

Tom Allen
clock 05 December 2023 • 2 min read
The Sellafield site in Cumbria, formerly known as Windscale

Government denies evidence of nuclear site hack

Report alleged Sellafield IT systems were attacked by hacking groups linked to Russia and China

clock 05 December 2023 • 2 min read
Hackers demand £300,000 to not leak royal family's medical records

Hackers demand £300,000 to not leak royal family's medical records

GCHQ and the police are investigating the attack

clock 04 December 2023 • 3 min read