Security researchers at ReliaQuest have uncovered an ongoing phishing campaign that leverages the trusted platform of LinkedIn to target high-value individuals, including executives and IT workers. The attack begins with a social engineering lure sent via LinkedIn's private messaging service. The ultimate goal is to convince the target to open a malicious archive file. A key feature of this campaign is its reliance on a legitimate, open-source Python script designed for penetration testing. By co-opting a legitimate tool, attackers can effectively blend their malicious activities with normal network traffic and system operations, a technique known as Living off the Land (LotL). This makes detection by traditional signature-based antivirus and security tools extremely challenging.
The campaign demonstrates the continued evolution of phishing attacks beyond traditional email vectors. Professional networking sites like LinkedIn are increasingly attractive platforms for attackers because users may have a higher level of trust in messages received there compared to email. The attack flow is as follows:
The core of this attack's evasiveness is the use of legitimate software for malicious purposes.
T1566.002 - Phishing: Spearphishing Link. The attack is initiated via a link in a LinkedIn message, which leads to the download of the malicious file.T1204.002 - User Execution: Malicious File. The user must be tricked into opening the downloaded archive and running the script or executable within.T1059.006 - Command and Scripting Interpreter: Python. The attack leverages the Python interpreter, which may be installed on the system or bundled with the payload. Since Python is a legitimate tool, its execution is less likely to be flagged as malicious.T1218 - System Binary Proxy Execution. The use of a legitimate tool like a pen-testing script is a form of proxy execution, where the malicious intent is masked by the benign nature of the software itself.A successful attack could provide an attacker with initial access to a high-value employee's workstation. From there, the impact could range from the theft of sensitive corporate data and credentials to a full-blown ransomware attack. The targeting of executives is particularly dangerous, as they often have broad access to confidential company information. The use of legitimate tools makes forensic investigation and attribution more difficult, as the attacker's actions may be indistinguishable from legitimate administrative or development activities.
No specific file hashes, IP addresses, or domains were provided in the source articles.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| command_line_pattern | python.exe -c "import socket,subprocess,os..." |
Look for python.exe being launched with suspicious command-line arguments, such as those used to create a reverse shell. | EDR, Sysmon (Event ID 1) | high |
| network_traffic_pattern | Outbound connections from python.exe |
The Python interpreter making direct outbound network connections to unusual IPs or domains is highly suspicious. | EDR, Firewall logs, Netflow | high |
| process_name | WINWORD.EXE -> python.exe |
Monitor for process chains where a common application like a web browser or Office app spawns a scripting interpreter like python.exe. | EDR, Sysmon | medium |
Detection:
python.exe, powershell.exe) being executed by unusual parent processes or making outbound network connections.Response:
M1017 - User Training. This is the primary mitigation. Educate all employees, especially executives, about the risks of phishing on social media platforms like LinkedIn. Teach them to never download or execute files from untrusted sources.M1038 - Execution Prevention. Where possible, use application control solutions (like AppLocker) to restrict the execution of scripting interpreters like Python to only authorized users (e.g., developers).The primary defense against this social engineering attack is to train users to be skeptical of unsolicited messages and attachments on all platforms, including LinkedIn.
Using application control to restrict which users and processes can run scripting interpreters like Python can prevent the malicious payload from executing.
Mapped D3FEND Techniques:
An EDR solution focused on behavioral analysis can detect the anomalous process chain of a social media message leading to the execution of a scripting tool.
Mapped D3FEND Techniques:
Since the initial vector is a social engineering attack on LinkedIn, technical controls must be supplemented with robust user awareness. Implement continuous security awareness training that specifically addresses threats on social and professional networking platforms. Use phishing simulations that mimic this TTP, sending fake LinkedIn messages with links or attachments to test and train employee resilience. For high-value targets like executives, provide specialized, one-on-one briefings on the risks. The goal is to condition users to treat any unsolicited message on LinkedIn with the same suspicion as a potential phishing email, and to never download or run files from unknown contacts, thereby interrupting the attack chain at the source.
To counter the 'Living off the Land' aspect of this attack, deploy an application allowlisting solution such as Windows Defender Application Control (WDAC). For most corporate users who are not developers, there is no legitimate business need to run python.exe. Create a policy that denies the execution of scripting interpreters like Python for all standard users. For developers who do need it, create a more permissive policy that is only applied to their specific user accounts or devices. This 'least privilege' approach to application execution ensures that even if a user is tricked into downloading the malicious Python script, it will be blocked from running, effectively stopping the attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats