Difference between revisions of "DBSA:2013-0007"

From Digibase Knowledge Base
Jump to: navigation, search
m
Line 9: Line 9:
 
'''Last Modified:''' {{REVISIONTIMESTAMP}} by {{REVISIONUSER}}
 
'''Last Modified:''' {{REVISIONTIMESTAMP}} by {{REVISIONUSER}}
  
'''Who should take note:''' iOS (iPhone, iPad, iTouch) and Linkedin Users
+
'''Who should take note:''' Apple iOS (iPhone, iPad, iTouch) and Linkedin Users
  
 
==Classification==
 
==Classification==

Revision as of 00:38, 26 October 2013

DBSA ID: 2013-0007

Regarding: Mail Interception by Linkedin

Writeup: Kradorex Xeron (talk) 00:12, 25 October 2013 (EDT)

Date: 2013 10 24

Last Modified: 20131026003815 by Kradorex Xeron

Who should take note: Apple iOS (iPhone, iPad, iTouch) and Linkedin Users

Classification

Priority: HIGH

Rationale: Users and organizations must act to ensure their mail is not compromised by a third party.

Severity: MODERATE

Rationale: The compromises can result in confidential information being intercepted by a third party not privy to such information.

Spread of Issue: SINGLE-PLATFORM HIGH

Rationale: Users of iOS and Linkedin are suseptable to utilizing the software.

Description

Linkedin is releasing a software product named "Linkedin Intro" that promises to integrate iOS mail clients with the Linkedin service, promising to provide information on how people are connected and other information to users. This is performed by piping/proxying mail accessed through Linkedin's servers to process the incoming mail regardless on who hosts the mail server. Digibase classifies this software as trojan spyware as it provides a promise of positivity but bait and switches it with scanning information not privy to them.

Mitigation/Solution

All users affected are advised not to utilize the "Linkedin Intro" software and to remove it if it exists already on devices. It is further advised to treat this software as malware.

References