DBSA:2013-0007

From Digibase Knowledge Base
Revision as of 04:39, 29 October 2013 by Kradorex Xeron (talk | contribs)
Jump to: navigation, search

Disclaimer: as technology changes, advisories may become out of date or may no longer be relevant, please refer to the "Date" section of the header to be sure the advisory is recent as pertains to your situation.

Digibase Security Advisory - Mail Interception by Linkedin

Keywords: Linkedin, Mail, MiTM, Interception, Linkedin Intro

DBSA ID: 2013-0007

Regarding: Mail Interception by Linkedin

Writeup: Kradorex Xeron (talk) 00:12, 25 October 2013 (EDT)

Date: 2013 10 24

Last Modified: 20131029043906 by Kradorex Xeron

Who should take note: Apple iOS (iPhone, iPad, iTouch) and Linkedin Users

Classification

Priority: HIGH

Rationale: Users and organizations must act to ensure their mail is not compromised by a third party.

Severity: MODERATE

Rationale: The compromises can result in confidential information being intercepted by a third party not privy to such information.

Spread of Issue: SINGLE-PLATFORM HIGH

Rationale: Users of iOS and Linkedin are suseptable to utilizing the software.

Description

Linkedin is releasing a software product named "Linkedin Intro" that promises to integrate iOS mail clients with the Linkedin service, promising to provide information on how people are connected and other information to users. This is performed by piping/proxying mail accessed through Linkedin's servers to process the incoming mail regardless on who hosts the mail server. Digibase classifies this software as trojan spyware as it provides a promise of positivity but bait and switches it with scanning information not privy to them.

Mitigation/Solution

All users affected are advised not to utilize the "Linkedin Intro" software and to remove it if it exists already on devices. It is further advised to treat this software as malware.

References