LinkedIn Phishing Email Enumeration


Summary (TL;DR)

Using an automated web bot, it is possible to scrape personnel names and then translate those names into emails that can be used in phishing campaigns. Proof of concept uploaded to Github.

Creating the LinkedIn Web Bot

While testing, it was identified that LinkedIn will temporarily disable accounts suspected of employing bot automation (and presumably with enough violations, could result in permanent deletion of account).

Header

The team found that by rate-limiting requests at varied intervals and limiting total daily requests to less that 800, we were able to use automated bots on the network without having the accounts suspended.

Bot Operations

The proof of concept bot does the following:

  1. Logs into LinkedIn using an existing account
  2. Searches the supplied company name
  3. Narrows the search to return "People" objects
  4. Opens Advanced Search options, and selects only individuals that currently work at the company
  5. Progressively clicks through 100 pages of profiles and gathers names
  6. Converts the names into emails based on a known-naming convention

Github Repository

Github - LinkedIn Mail Scraper

Demonstration