• 'Your login credentials may already be slipping into the hands of

    From TechnologyDaily@1337:1/100 to All on Mon Apr 6 20:45:32 2026
    'Your login credentials may already be slipping into the hands of a cybercriminal': Hackers target LinkedIn accounts with devious new phishing attacks here's how to stay safe

    Date:
    Mon, 06 Apr 2026 19:40:00 +0000

    Description:
    Hackers use realistic LinkedIn notifications and job scams, combining personalization, automation, and fake domains to steal credentials globally.

    FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Pro Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Become a Member in Seconds Unlock instant access to exclusive member features. Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. You are
    now subscribed Your newsletter sign-up was successful Join the club Get full access to premium articles, exclusive features and a growing list of member rewards. Explore An account already exists for this email address, please log in. Subscribe to our newsletter Hackers exploit LinkedIn notifications to trick users into giving login credentials Phishing emails often pose as
    urgent job opportunities to manipulate recipients Fraudulent domains like inedin[.]digital mimic LinkedIn to gain trust Experts have warned hackers are increasingly exploiting LinkedIn notifications to trick users into providing sensitive login information, using highly realistic emails that imitate legitimate alerts.

    New research from Cofense outlines how these campaigns often pose as job opportunities, preying on urgency and curiosity to manipulate recipients into interacting with malicious links. The attackers mostly rely on emotional triggers to bypass rational caution and gain access to accounts. Article continues below You may like Hackers hijack LinkedIn comments to spread malware - here's what to look out for A new LinkedIn phishing scam is targeting executives online - make sure you don't fall for this Looking for a job at Meta, Disney, and Spotify? It could be a scam, NordVPN warns Attackers manipulate emotions to bypass user caution The malicious emails frequently appear to come from recruiters at reputable firms, complete with convincing logos, fonts, and formatting.

    The research team noted even the smallest details are deliberately copied
    from authentic LinkedIn pages to create trust, with the fake domain inedin[.]digital closely resembling the legitimate LinkedIn website.

    Fraudulent sender addresses, such as khanieteam[.]com, are similarly crafted to avoid immediate suspicion, despite having no affiliation with LinkedIn.

    Many of the spoofed websites and email accounts were created only months or even days before attacks, showing the speed with which threat actors can deploy new campaigns. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners
    or sponsors By submitting your information you agree to the Terms &
    Conditions and Privacy Policy and are aged 16 or over.

    These attackers are not static; they consistently refine their technical sophistication to get their target.

    Cofense also reports the campaigns increasingly incorporate publicly
    available personal data, including home addresses and mapped locations, to heighten credibility.

    In one notable example, attackers embedded Google Maps screenshots in extortion emails, a deceptive move to convince recipients. What to read next TikTok for Business accounts targeted in phishing campaign here's how to
    stay safe Watch out: hackers are hijacking Microsoft Teams messages to try
    and get access to your emails - here's what you need to look out for Beware, hackers have hijacked OpenAIs 'invite your team' feature to break into your business

    Personalization and automation make these campaigns both cheaper and faster
    to launch than traditional phishing attacks.

    Cofense provided technical details, including email indicators of compromise (IOCs), lists of observed IP addresses, and payload URLs, to assist cybersecurity professionals in detecting and mitigating these schemes.

    The phishing emails are often translated from other languages, such as Chinese, demonstrating the global scope of these campaigns.

    Even minimal delays in analyzing these attacks can result in compromised credentials; therefore, organizations need to implement rapid response.

    Being aware of malware threats is critical, as attackers often use it to harvest credentials and compromise devices.

    Users are advised to remain alert when receiving unexpected LinkedIn notifications and should verify the authenticity of senders before clicking links.

    Cofense recommends combining human intelligence with automated threat detection to allow security teams to neutralize campaigns before widespread impact.

    Regularly updated antivirus software can provide an additional layer of protection against malicious attachments and harmful links.

    Security experts stress the importance of checking URLs carefully, avoiding shortcuts to login pages, and confirming communication through official channels.

    A robust firewall can also help block unauthorized access and prevent attackers from exploiting system vulnerabilities.

    That said, thinking twice before interacting with such emails remains the
    most effective step against increasingly convincing phishing attacks. Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.



    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/your-login-credentials-may-already-be-s lipping-into-the-hands-of-a-cybercriminal-hackers-target-linkedin-accounts-wit h-devious-new-phishing-attack-heres-how-to-stay-safe


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)