LinkedIn Notification Scam Evades Filters, Delivers RAT Through Emails

March 7, 2025

In a time when email phishing scams are becoming increasingly sophisticated, cybercriminals have found new ways to exploit LinkedIn notifications to bypass security filters and deliver malware. Running since at least May 2024, this scam has managed to deceive many by spoofing LinkedIn invitations using an outdated but convincing email template from 2020. These emails, which appear as LinkedIn InMail messages, ask recipients for quotes on products or services, creating a sense of urgency. However, instead of leading to legitimate business inquiries, clicking on options like “Read More” or “Reply To” results in downloading a ConnectWise remote access trojan (RAT) installer.

Exploiting Email Security Vulnerabilities

Despite failing basic email verification checks like Sender Policy Framework (SPF) and lacking DomainKeys Identified Mail (DKIM) signatures, these scam emails have still successfully slipped through Microsoft Defender ATP. The primary culprit is misconfigured spam filter settings, particularly the DMARC actions set to “reject.” As a result, the emails were flagged as spam but were not entirely blocked, allowing them to reach recipients’ inboxes with spam warnings intact.

This loophole in email security settings highlights the complexities and challenges organizations face in securing their communications channels. Cybercriminals leverage these vulnerabilities to ensure their malicious emails evade common detection methods, significantly increasing their chances of a successful attack. Moreover, this scam underscores the critical importance of keeping email security configurations up to date and rigorously tested to withstand ever-evolving threats.

Potential Dangers Beyond RAT Installation

Though the primary purpose of the scam is to deliver RATs, the method used can also deploy other malicious payloads. Infostealers, links designed to harvest credentials, and tools that facilitate business email compromise (BEC) attacks can all be disseminated through this same technique. The initial success of these phishing emails to deliver malware indicates that cybercriminals could diversify their payloads, expanding their arsenal to include various forms of cyber attacks.

The notion that a seemingly innocuous LinkedIn notification could be a severe threat necessitates a proactive approach in scrutinizing such emails. Organizations and individual users must recognize these risks and take preventive measures to safeguard their digital environments. This awareness and preparedness are paramount in defending against sophisticated email scams that bypass traditional security filters.

Importance of Properly Configured Security Settings

Addressing this problem requires a concerted effort to ensure email security settings are appropriately configured. Organizations need to review and refine their email security settings regularly, particularly focusing on enforcing strict DMARC policies. Implementing robust security measures, like enhanced spam filters and multi-factor authentication, can significantly mitigate the risk of such scams infiltrating inboxes.

Furthermore, employee training is essential to build awareness about the latest phishing tactics and foster a security-conscious culture within the organization. Regular phishing simulation exercises can be instrumental in helping employees recognize and report suspicious emails. By combining advanced technological defenses with human vigilance, organizations can enhance their overall security posture and reduce the likelihood of falling victim to these clever scams.

Future Considerations and Next Steps

In an era where email phishing scams are increasingly sophisticated, cybercriminals have discovered new techniques to exploit LinkedIn notifications to sneak past security filters and distribute malware. Since at least May 2024, this scheme has successfully tricked numerous individuals by imitating LinkedIn invitations with an outdated yet convincing email template from 2020. These emails look like LinkedIn InMail messages and request recipients to provide quotes on various products or services, creating an urgent need to respond. However, rather than directing users to legitimate business inquiries, clicking on options like “Read More” or “Reply To” initiates the download of a ConnectWise remote access trojan (RAT) installer. This scam leverages the trust people place in LinkedIn’s professional setting to infect their devices with malicious software, ultimately compromising personal and corporate security. The deceptive strategy underscores the evolving nature of phishing attacks and the importance of staying vigilant against even seemingly credible requests.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later