Get all your news in one place.
100's of premium titles.
One app.
Start reading
TechRadar
TechRadar
Efosa Udinmwen

'Your login credentials may already be slipping into the hands of a cybercriminal': Hackers target LinkedIn accounts with devious new phishing attacks — here's how to stay safe

In this photo illustration, the business and employment-oriented network and platform owned by Microsoft, LinkedIn, logo seen displayed on a smartphone with an Artificial intelligence (AI) chip and symbol in the background.

  • Hackers exploit LinkedIn notifications to trick users into giving login credentials
  • Phishing emails often pose as urgent job opportunities to manipulate recipients
  • Fraudulent domains like “inedin[.]digital” mimic LinkedIn to gain trust

Experts have warned hackers are increasingly exploiting LinkedIn notifications to trick users into providing sensitive login information, using highly realistic emails that imitate legitimate alerts.

New research from Cofense outlines how these campaigns often pose as job opportunities, preying on urgency and curiosity to manipulate recipients into interacting with malicious links.

The attackers mostly rely on emotional triggers to bypass rational caution and gain access to accounts.

Attackers manipulate emotions to bypass user caution

The malicious emails frequently appear to come from recruiters at reputable firms, complete with convincing logos, fonts, and formatting.

The research team noted even the smallest details are deliberately copied from authentic LinkedIn pages to create trust, with the fake domain “inedin[.]digital” closely resembling the legitimate LinkedIn website.

Fraudulent sender addresses, such as “khanieteam[.]com,” are similarly crafted to avoid immediate suspicion, despite having no affiliation with LinkedIn.

Many of the spoofed websites and email accounts were created only months or even days before attacks, showing the speed with which threat actors can deploy new campaigns.

These attackers are not static; they consistently refine their technical sophistication to get their target.

Cofense also reports the campaigns increasingly incorporate publicly available personal data, including home addresses and mapped locations, to heighten credibility.

In one notable example, attackers embedded Google Maps screenshots in extortion emails, a deceptive move to convince recipients.

Personalization and automation make these campaigns both cheaper and faster to launch than traditional phishing attacks.

Cofense provided technical details, including email indicators of compromise (IOCs), lists of observed IP addresses, and payload URLs, to assist cybersecurity professionals in detecting and mitigating these schemes.

The phishing emails are often translated from other languages, such as Chinese, demonstrating the global scope of these campaigns.

Even minimal delays in analyzing these attacks can result in compromised credentials; therefore, organizations need to implement rapid response.

Being aware of malware threats is critical, as attackers often use it to harvest credentials and compromise devices.

Users are advised to remain alert when receiving unexpected LinkedIn notifications and should verify the authenticity of senders before clicking links.

Cofense recommends combining human intelligence with automated threat detection to allow security teams to neutralize campaigns before widespread impact.

Regularly updated antivirus software can provide an additional layer of protection against malicious attachments and harmful links.

Security experts stress the importance of checking URLs carefully, avoiding shortcuts to login pages, and confirming communication through official channels.

A robust firewall can also help block unauthorized access and prevent attackers from exploiting system vulnerabilities.

That said, thinking twice before interacting with such emails remains the most effective step against increasingly convincing phishing attacks.


Sign up to read this article
Read news from 100's of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.