Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

LinkedIn sues hackers after scraping effort

by The Gurus
January 9, 2014
in Editor's News
Share on FacebookShare on Twitter

Hackers were able to use the Amazon cloud in order to scrape data from LinkedIn profiles.
 
According to Arstechnica, the hackers employed a raft of techniques designed to bypass anti-scraping measures built into the network, including the creation of huge numbers of fake accounts. They also circumvented security measures that are supposed to require end-users to complete bot-defeating CAPTCHA dialogues when potentially abusive activities are detected.
 
Because of this, LinkedIn is suing the attackers over the scraping of information. This, LinkedIn’s attorneys alleged in a complaint filed this week, is “explicitly barred by LinkedIn’s User Agreement, which prohibits access to LinkedIn ‘through scraping, spidering, crawling, or other technology or software used to access data without the express written consent of LinkedIn or its Members”.
 
The complaint also said that registering so many unique new accounts allowed the defendants to view hundreds of thousands of member profiles per day. Now it is implementing additional technological safeguards to prevent further scraping and conducted an extensive investigation into the bot-powered methods employed by the hackers.
 
LinkedIn also determined that attackers accessed LinkedIn using Amazon Web Services to rent virtual computers on which to run their own computer programs and applications. “The defendants used Amazon EC2 to create virtual machines to run automated bots to scrape data from LinkedIn’s website,” the complaint said.
 
Mike Small, a member of the ISACA Security Advisory Group, said that this was made possible as cloud services are cheap to set up, easy to use and potentially very powerful. “They usually need only a credit card to get access. They are likely to be as attractive to hackers and cyber criminals as they are to legitimate users,” he said.
 
“Cloud services usually have extensive controls in place to prevent their use for illegitimate or illegal purposes and the cloud service contracts normally specifically forbid this. Cyber criminals would need to find a way to cloak their identity when using a public cloud service in this way.”
 
According to research by Imperva from December 2013, attackers were using hosted service-based models to host command and control (C&C) servers to allow easier access to data, from both inside and outside the service, and to do botnet management and as an infrastructure for both infection and data exfiltration.

FacebookTweetLinkedIn
Tags: Cloud
ShareTweetShare
Previous Post

Responsibility for malvertising lies with the advertising platform

Next Post

Now ANYONE on Google+ can email you, with or without your Gmail addy

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information