'Your login credentials may already be slipping into the hands of a cybercriminal': Hackers target LinkedIn accounts with devious new phishing attacks — here's how to stay safe

In this photo illustration, the business and employment-oriented network and platform owned by Microsoft, LinkedIn, logo seen displayed on a smartphone with an Artificial intelligence (AI) chip and symbol in the background.
(Image credit: Photo Illustration by Budrul Chukrut/SOPA Images/LightRocket via Getty Images)

  • Hackers exploit LinkedIn notifications to trick users into giving login credentials
  • Phishing emails often pose as urgent job opportunities to manipulate recipients
  • Fraudulent domains like “inedin[.]digital” mimic LinkedIn to gain trust

Experts have warned hackers are increasingly exploiting LinkedIn notifications to trick users into providing sensitive login information, using highly realistic emails that imitate legitimate alerts.

New research from Cofense outlines how these campaigns often pose as job opportunities, preying on urgency and curiosity to manipulate recipients into interacting with malicious links.

The attackers mostly rely on emotional triggers to bypass rational caution and gain access to accounts.

Article continues below

Attackers manipulate emotions to bypass user caution

The malicious emails frequently appear to come from recruiters at reputable firms, complete with convincing logos, fonts, and formatting.

The research team noted even the smallest details are deliberately copied from authentic LinkedIn pages to create trust, with the fake domain “inedin[.]digital” closely resembling the legitimate LinkedIn website.

Fraudulent sender addresses, such as “khanieteam[.]com,” are similarly crafted to avoid immediate suspicion, despite having no affiliation with LinkedIn.

Many of the spoofed websites and email accounts were created only months or even days before attacks, showing the speed with which threat actors can deploy new campaigns.

These attackers are not static; they consistently refine their technical sophistication to get their target.

Cofense also reports the campaigns increasingly incorporate publicly available personal data, including home addresses and mapped locations, to heighten credibility.

In one notable example, attackers embedded Google Maps screenshots in extortion emails, a deceptive move to convince recipients.

Personalization and automation make these campaigns both cheaper and faster to launch than traditional phishing attacks.

Cofense provided technical details, including email indicators of compromise (IOCs), lists of observed IP addresses, and payload URLs, to assist cybersecurity professionals in detecting and mitigating these schemes.

The phishing emails are often translated from other languages, such as Chinese, demonstrating the global scope of these campaigns.

Even minimal delays in analyzing these attacks can result in compromised credentials; therefore, organizations need to implement rapid response.

Being aware of malware threats is critical, as attackers often use it to harvest credentials and compromise devices.

Users are advised to remain alert when receiving unexpected LinkedIn notifications and should verify the authenticity of senders before clicking links.

Cofense recommends combining human intelligence with automated threat detection to allow security teams to neutralize campaigns before widespread impact.

Regularly updated antivirus software can provide an additional layer of protection against malicious attachments and harmful links.

Security experts stress the importance of checking URLs carefully, avoiding shortcuts to login pages, and confirming communication through official channels.

A robust firewall can also help block unauthorized access and prevent attackers from exploiting system vulnerabilities.

That said, thinking twice before interacting with such emails remains the most effective step against increasingly convincing phishing attacks.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.