Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

5 Reasons Why Attackers Are Phishing Over LinkedIn

Posted on November 17, 2025November 17, 2025 By CWS

Phishing assaults are now not confined to the e-mail inbox, with 1 in 3 phishing assaults now happening over non-email channels like social media, serps, and messaging apps.
LinkedIn specifically has change into a hotbed for phishing assaults, and for good purpose. Attackers are working subtle spear-phishing assaults towards firm executives, with latest campaigns seen concentrating on enterprises in monetary providers and know-how verticals.
However phishing exterior of e-mail stays severely underreported — not precisely shocking after we think about that a lot of the business’s phishing metrics come from e-mail safety instruments.
Your preliminary thought may be “why do I care about workers getting phished on LinkedIn?” Properly, whereas LinkedIn is a private app, it is routinely used for work functions, accessed from company gadgets, and attackers are particularly concentrating on enterprise accounts like Microsoft Entra and Google Workspace.
So, LinkedIn phishing is a key menace that companies should be ready for at this time. This is 5 issues it is advisable learn about why attackers are going phishing on LinkedIn — and why it is so efficient.
1: It bypasses conventional safety instruments
LinkedIn DMs fully sidestep the e-mail safety instruments that the majority organizations depend on for phishing safety. In observe, workers entry LinkedIn on work laptops and telephones, however safety groups don’t have any visibility into these communications. Which means workers may be messaged by outsiders on their work gadgets with none danger of e-mail interception.
To make issues worse, fashionable phishing kits use an array of obfuscation, anti-analysis, and detection evasion methods to get round anti-phishing controls based mostly on the inspection of a webpage (equivalent to internet crawling safety bots), or evaluation of internet site visitors (equivalent to an online proxy). This leaves most organizations left counting on consumer coaching and reporting as their principal line of protection — not a terrific scenario.

However even when noticed and reported by a consumer, what can you actually do a couple of LinkedIn phish? You possibly can’t see which different accounts had been focused or hit in your consumer base. In contrast to e-mail, there is not any technique to recall or quarantine the identical message hitting a number of customers. There is no rule you’ll be able to modify, or senders you’ll be able to block. You possibly can report the account, and possibly the malicious account will get frozen — however the attacker has in all probability acquired what they wanted by then and moved on.
Most organizations merely block the URLs concerned. However this does not actually assist when attackers are quickly rotating their phishing domains — by the point you block one website, a number of extra have already taken its place. It is a sport of whack-a-mole — and it is rigged towards you.
2: It is low-cost, simple, and scalable for attackers
There are a few issues that make phishing over LinkedIn extra accessible than email-based phishing assaults.
With e-mail, it is common for attackers to create e-mail domains prematurely, going by way of a warm-up interval to construct up area fame and move mail filters. The comparability with social media apps like LinkedIn could be creating accounts, making connections, including posts and content material, and dressing them as much as seem legit.
Besides it is extremely simple to only take over legit accounts. 60% of credentials in infostealer logs are linked to social media accounts, a lot of which lack MFA (as a result of MFA adoption is much decrease on nominally “private” apps the place customers aren’t inspired so as to add MFA by their employer). This offers attackers a reputable launchpad for his or her campaigns, slotting into an account’s present community and exploiting that belief.
Combining the hijacking of legit accounts with the chance afforded by AI-powered direct messages means attackers can simply scale their LinkedIn outreach.
3: Quick access to high-value targets
Like every gross sales skilled is aware of, LinkedIn recon is trivial. It is simple to map out a company’s LinkedIn profiles and choose appropriate targets to strategy. In reality, LinkedIn is already a prime instrument for crimson teamers and attackers alike when scoping out potential social engineering targets — e.g. reviewing job roles and descriptions to estimate which accounts have the degrees of entry and privilege it is advisable launch a profitable assault.
There is no screening or filtering of LinkedIn messages both, no spam safety, or assistant monitoring the inbox for you. It is arguably essentially the most direct technique to attain your meant contact, and due to this fact the most effective locations to launch extremely focused spear-phishing assaults.

4: Customers usually tend to fall for it
The character {of professional} networking apps like LinkedIn is that you just count on to attach and work together with individuals exterior of your group. In reality, a high-powered govt is much extra more likely to open and reply to a LinkedIn DM than one more spam e-mail.
Notably when mixed with account hijacking, messages from identified contacts are much more more likely to get a response. It is the equal of taking up an e-mail account for an present enterprise contact — which has been the supply of many information breaches up to now.
In reality, in some latest circumstances, these contacts have been fellow workers — so it is extra like an attacker taking up one in every of your organization e-mail accounts and utilizing that to spear-phish your C-Suite execs. Mixed with the correct pretext (e.g. in search of pressing approval, or reviewing a doc) and the prospect of success will increase considerably.

5: The potential rewards are large
Simply because these assaults are taking place over a “private” app does not imply the affect is proscribed. It is essential to consider the larger image.
Most phishing assaults deal with core enterprise cloud platforms equivalent to Microsoft and Google, or specialist Id Suppliers like Okta. Taking on one in every of these accounts would not simply give entry to the core apps and information throughout the respective app, but in addition allows the attacker to leverage SSO to signal into any linked app that the worker logs into.
This offers an attacker entry to only about each core enterprise operate and dataset in your group. And from this level, it is also a lot simpler to focus on different customers of those inside apps — utilizing enterprise messaging apps like Slack or Groups, or methods like SAMLjacking to show an app right into a watering gap for different customers attempting to log in.

Mixed with spear-phishing govt workers, the payoff is important. A single account compromise can shortly snowball right into a multi-million greenback, business-wide breach.
And even when the attacker solely manages to achieve your worker on their private gadget, this could nonetheless be laundered into a company account compromise. Simply take a look at the 2023 Okta breach, the place an attacker exploited the truth that an Okta worker had signed into a private Google profile on their work gadget. This meant any credentials saved of their browser had been synced to their private gadget — together with the credentials for 134 buyer tenants. When their private gadget acquired hacked, so did their work account.
This is not only a LinkedIn downside
With fashionable work taking place throughout a community of decentralized web apps, and extra diverse communication channels exterior of e-mail, it is more durable than ever to cease customers from interacting with malicious content material.
Attackers can ship hyperlinks over immediate messenger apps, social media, SMS, malicious adverts, and utilizing in-app messenger performance, in addition to sending emails straight from SaaS providers to bypass email-based checks. Likewise, there at the moment are lots of of apps per enterprise to focus on, with various ranges of account safety configuration.
Thinking about studying extra about how phishing developed in 2025? Register for the upcoming webinar from Push Safety the place we’ll be taking you thru the important thing phishing stats, tendencies, and case research of 2025.
Phishing is now delivered over a number of channels, not simply e-mail, concentrating on a variety of cloud and SaaS apps.
Cease phishing the place it occurs: within the browser
Phishing has moved exterior of the mailbox — it is vital that safety does too.
To deal with fashionable phishing assaults, organizations want an answer that detects and blocks phishing throughout all apps and supply vectors.
Push Safety sees what your customers see. It would not matter what supply channel or detection evasion strategies are used, Push shuts the assault down in actual time, because the consumer masses the malicious web page of their internet browser — by analysing the web page code, conduct, and consumer interplay in actual time.

This is not all we do: Push blocks browser-based assaults like AiTM phishing, credential stuffing, malicious browser extensions, malicious OAuth grants, ClickFix, and session hijacking. It’s also possible to use Push to proactively discover and repair vulnerabilities throughout the apps that your workers use, like ghost logins, SSO protection gaps, MFA gaps, and weak passwords. You possibly can even see the place workers have logged into private accounts of their work browser (to stop conditions just like the 2023 Okta breach talked about earlier).
To study extra about Push, take a look at our newest product overview or e-book a while with one in every of our group for a stay demo.

Discovered this text fascinating? This text is a contributed piece from one in every of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attackers, LinkedIn, Phishing, Reasons

Post navigation

Previous Post: Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Next Post: Iranian SpearSpecter Attacking High-Value Officials Using Personalized Social Engineering Tactics

Related Posts

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves The Hacker News
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools The Hacker News
3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News