Threat actors are leveraging LinkedIn profiles to target victims with fake job offers that lead to the installation of a backdoor, warns a Canadian managed security services provider. Victims clicking on the link to the supposed job offer could end up installing a backdoor known as “more_eggs,” which could give a hacker remote control over the victim’s computer, allowing them to send, receive, launch and delete files, said Waterloo, Ont.-based eSentire in a blog released this morning. The attack described by eSentire researchers works like this: A threat actor finds a target on LinkedIn and creates a malicious zip file attachment named after the target’s current job. For example, a person’s job is listed as “Senior Account Executive—International Freight,” the malicious zip file would be titled “Senior Account Executive—International Freight position.”