Security experts have warned of a malicious spam campaign on LinkedIn capable of infecting users with the Zeus data-theft malware.
Cisco IronPort's senior security researcher, Henry Stern, explained in a blog post that the malicious email arrives containing a link with a fake LinkedIn contact request.
"Clicking the link takes victims to a web page that says 'please waiting…. 4 seconds' and redirects them to Google. During those four seconds, the victim's PC is infected with the ZeuS data-theft malware via a drive-by download," he said.
"ZeuS embeds itself in the victim's web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts."
The spam emails became so prevalent that, at one point on Monday, they accounted for as much as a quarter of all spam sent within a 15-minute interval, according to Stern.
"What makes this attack unique is the combination of the extremely high volume of messages transmitted, the focus on business users, and the use of the ZeuS data-theft malware," he said.
"This strongly suggests that the criminals behind this attack are most interested in employees with access to financial systems and online commercial bank accounts."
Stern said that organisations should instruct staff to delete any such request, especially from people they do not recognise.
Geoengineering on the sea floor near glaciers would form a new ice shelf to prevent melting
Alterations in capillary blood flow can be caused by body position change
Curiosity rover is in 'normal mode' but not transmitting scientific data back to base
NatWest outage comes a day after Barclays' IT systems shut out customers and staff