3 min read
The IT Wizards, or Why DIY Isn't the Answer
*The IT wizards or why DIY is not the solution The managing director of a medium-sized company was a man of exceptional calm. This calm was based...
There is this myth in IT security: attacks are becoming increasingly sophisticated, complex and technologically advanced. And then there's the reality: sometimes all it takes is a premium account in LinkedIn Sales Navigator, a little patience and a surprising amount of human help.
During an analysis, I came across a constellation that cannot be described as a classic bug. Rather a feature with security-related side effects.
Under certain privacy settings, LinkedIn allows paying users to view the email address with which people have registered. And in many cases, this is not the business address, but the private address (often with gmx, web, yahoo, hotmail, gmail and co.).
In other words, exactly the address at which:
In other words: a person's central digital identity.
No exploit. No hack. No darknet access necessary. Just a combination of default settings and a tool that is actually intended for sales.
Modern cyberattacks rarely start in the corporate network. They start with identities. And what emerges here is an almost perfect OSINT scenario:
This is not "nice to have".
This is ready-curated attack material.
The real danger only unfolds through interaction: First, the email address is extracted. This is followed by a comparison with known data leaks, for example via Have I Been Pwned. And suddenly you not only know who the person is, but also where they may have already been compromised.
This is where it becomes operational:
And then comes the decisive change of perspective:
The attack does not take place in the company - but in private life.
Because that's where it happens:
A well-crafted phishing attack on a CIO's private email often has better chances than any attack on the company network.
Perhaps the most elegant and at the same time most worrying part: many profiles are not initially that open. But they become so... after a contact request. And these are accepted surprisingly often.
Even if there is no personal connection, no message is included and the sender is completely unknown. In practice, this means that an attacker does not even have to access existing data. They can actively "unlock" it. Scalable. Can be automated. Effective.
Thousands of requests out.
Some are accepted.
And suddenly exactly the information that was previously protected is visible.
You are not hacked. You are networked.
We live in a time when it's somehow cool to have as many followers as possible. What we smile at other generations on TikTok and the like, we suddenly find ourselves practising on LinkedIn...
To make the risk more tangible, I contacted 30 IT managers (CIOs, CTOs, CISOs, IT managers and so on). Of course, they were all affected by the issue described above and all had private email addresses that had demonstrably already been leaked and appeared to be very valid. (In fact, there were also some exemplary users who used addresses specifically for LinkedIn. For example linkedin@eigenedomain.de
The message was deliberately neutral: no sales copy, no pitch, just a reference to a potential vulnerability I found in their accounts. And, of course, just before a public holiday (because we all know when the bad guys like to strike ...)
The reactions read like a brief picture of the state of IT security culture:
The statement was particularly noteworthy:
"LinkedIn is a private matter"
This is about as technically sound as: "My front door key has nothing to do with the security of my office. Even if I might have the transponder for the office in my pocket on the kitchen table."
To be fair, there were also positive examples. Some profiles were configured correctly:
These show: The problem is neither complex nor expensive to solve.
A third category is particularly critical: profiles that appear safe at first glance, but accept contact requests completely unchecked.
After networking:
→ Access to additional information
This is almost ideal from an attacker's point of view:
This is where a configuration issue becomes a real social engineering gateway.
Many security strategies focus on networks, systems, tools and so on. And of course, this is also extremely important and we ourselves offer exciting and good solutions for this.
But attackers also focus on:
And platforms like LinkedIn are precisely the interface where these two worlds collide.
What this example shows is not an isolated case. It is a structural problem. Companies invest in:
And overlooked:
For individuals:
For companies:
Cybersecurity is no longer just about the data center.
It begins:
And above all:
the willingness to take tips seriously.
Perhaps the most important insight from this experiment is therefore not of a technical nature:
The biggest weakness is rarely the technology.
It is how we deal with it.
Or, to put it more pointedly:
While we are discussing highly complex attack scenarios,
attackers are often satisfied with a much simpler approach:
A contact request - and an open door.
*This article was created with the help of ChatGPT, taking into account current market events. The prompt creation and supervision of the article was carried out by the author, who sees his opinion represented here.
Timo Imbrogno is Director Marketing at RIEDEL Networks, certainly not an IT expert, but a nerd at heart and likes to take a look behind the scenes from time to time. He found his first bug at the start of his professional career, when Facebook was still all the rage. Back then, it was in the publishing function of fan pages and custom apps, which were still really (!) popular at the time.
From time to time, his fingers get itchy and he looks at things not just from a marketing perspective, but with his very own view of things. He also likes to use unconventional approaches to clarify his point of view or to make people think. One example of this is the advertising material exchange station at IT-SA 2024.
His contributions deliberately move at the interface between specialist knowledge and humor - and invite you to look at even complex topics from an unusual perspective.
RIEDEL Networks is a privately held, global network provider focused on customized networks. We are listed in the Gartner Magic Quadrant for Global WAN Services as a niche provider specializing in mid-sized international enterprises and the media and events sector. With our own global backbone, we help companies to be connected worldwide. Our services include internet connectivity, MPLS, SD-WAN, SASE, Cloud Connect, security and much more. Our customers come from various industries and value quality, security and reliability. RIEDEL Networks is a 100% company of the RIEDEL Communications Group in Wuppertal, Germany, and is fully privately owned by Thomas Riedel.
3 min read
*The IT wizards or why DIY is not the solution The managing director of a medium-sized company was a man of exceptional calm. This calm was based...
3 min read
*A 2024 Health Check with a Wink "good news / could-do-better" The EU’s networks had quite the year: 188 reportable telecom incidents—a record...
3 min read
*Rule no. 1 of cyber security Denial is not a strategy. Berlin/Potsdam – While Russian hackers sharpen their claws, Germany is still busy looking...