The post LinkedIn DM Attack Warning — What Users Need To Know appeared on BitcoinEthereumNews.com. Beware the latest LinkedIn attack, security experts warn. NurPhoto via Getty Images Gmail passwords leaked, PayPal users warned of attacks, even Twitter, sorry X, issuing an account lockdown warning, are all, sadly, par for the cybersecurity news headlines course these days. What isn’t is attacks that focus on LinkedIn, the professional and business networking platform that boasts more than a billion users. If you are one of them, then I apologize, but you need to be aware of just such an occurrence. ForbesWhatsApp Confirms Sudden Backup Passkey Security Move For BillionsBy Davey Winder LinkedIn Users Warned To Beware This New Direct Message Attack The last time I wrote a LinkedIn-specific news story was way back in February, when I warned of a Lazarus attack that targeted the wrong user. That LinkedIn doesn’t feature more in security news reports is a good thing; it means the platform is doing something right. This latest warning, however, is worth taking seriously, as the attackers are targeting the right users — at least in terms of potentially profitable outcomes. Push Security researcher Dan Green has confirmed that business executives on the networking platform are vulnerable to a “high-risk LinkedIn phishing attack,” via the LinkedIn direct messaging resource. ​​This is particularly worrying because LinkedIn itself, “while often used for work and commonly accessed from corporate devices,” Green warned, “sits outside the purview of enterprise security tools, exploiting a visibility and control blind spot.” In the case detailed by Green, in technical glory for those who like such things, the victim received a malicious LinkedIn direct message which redirected them a total of three times, through Google Search, a supposed payroll site and ultimately to a custom landing page hosting various documents. “Upon clicking on one of the document links on the page, the victim is… The post LinkedIn DM Attack Warning — What Users Need To Know appeared on BitcoinEthereumNews.com. Beware the latest LinkedIn attack, security experts warn. NurPhoto via Getty Images Gmail passwords leaked, PayPal users warned of attacks, even Twitter, sorry X, issuing an account lockdown warning, are all, sadly, par for the cybersecurity news headlines course these days. What isn’t is attacks that focus on LinkedIn, the professional and business networking platform that boasts more than a billion users. If you are one of them, then I apologize, but you need to be aware of just such an occurrence. ForbesWhatsApp Confirms Sudden Backup Passkey Security Move For BillionsBy Davey Winder LinkedIn Users Warned To Beware This New Direct Message Attack The last time I wrote a LinkedIn-specific news story was way back in February, when I warned of a Lazarus attack that targeted the wrong user. That LinkedIn doesn’t feature more in security news reports is a good thing; it means the platform is doing something right. This latest warning, however, is worth taking seriously, as the attackers are targeting the right users — at least in terms of potentially profitable outcomes. Push Security researcher Dan Green has confirmed that business executives on the networking platform are vulnerable to a “high-risk LinkedIn phishing attack,” via the LinkedIn direct messaging resource. ​​This is particularly worrying because LinkedIn itself, “while often used for work and commonly accessed from corporate devices,” Green warned, “sits outside the purview of enterprise security tools, exploiting a visibility and control blind spot.” In the case detailed by Green, in technical glory for those who like such things, the victim received a malicious LinkedIn direct message which redirected them a total of three times, through Google Search, a supposed payroll site and ultimately to a custom landing page hosting various documents. “Upon clicking on one of the document links on the page, the victim is…

LinkedIn DM Attack Warning — What Users Need To Know

2025/10/31 21:21
3 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo crypto.news@mexc.com.

Beware the latest LinkedIn attack, security experts warn.

NurPhoto via Getty Images

Gmail passwords leaked, PayPal users warned of attacks, even Twitter, sorry X, issuing an account lockdown warning, are all, sadly, par for the cybersecurity news headlines course these days. What isn’t is attacks that focus on LinkedIn, the professional and business networking platform that boasts more than a billion users. If you are one of them, then I apologize, but you need to be aware of just such an occurrence.

ForbesWhatsApp Confirms Sudden Backup Passkey Security Move For Billions

LinkedIn Users Warned To Beware This New Direct Message Attack

The last time I wrote a LinkedIn-specific news story was way back in February, when I warned of a Lazarus attack that targeted the wrong user. That LinkedIn doesn’t feature more in security news reports is a good thing; it means the platform is doing something right. This latest warning, however, is worth taking seriously, as the attackers are targeting the right users — at least in terms of potentially profitable outcomes. Push Security researcher Dan Green has confirmed that business executives on the networking platform are vulnerable to a “high-risk LinkedIn phishing attack,” via the LinkedIn direct messaging resource.

​​This is particularly worrying because LinkedIn itself, “while often used for work and commonly accessed from corporate devices,” Green warned, “sits outside the purview of enterprise security tools, exploiting a visibility and control blind spot.”

In the case detailed by Green, in technical glory for those who like such things, the victim received a malicious LinkedIn direct message which redirected them a total of three times, through Google Search, a supposed payroll site and ultimately to a custom landing page hosting various documents. “Upon clicking on one of the document links on the page, the victim is prompted to view with Microsoft,” and, well, you can probably guess the rest. A cloned Microsoft page requires credentials to be entered and 2FA authentication to be completed, at which point the attacker has that Microsoft session stolen.

ForbesGoogle Chrome Crash Warning For 3 Billion — No Fix Available

LinkedIn As An Attack Platform Is A Clever Move By Scammers

Using LinkedIn to launch such attacks is a clever move by threat actors, not least as many users will be expecting contacts from outside of their organization to talk about work. By not using email, this also adds to the detection-evasion toolkit. The attackers then used a chain of legitimate sites to avoid being flagged as suspicious and to cloak the ultimate URL destination..

“Just because the attack happens over LinkedIn doesn’t lessen the impact,” Green said, “these are corporate credentials and accounts being targeted, even if it is nominally a ‘personal’ application.”

I reached out to LinkedIn, and a spokesperson provided the following statement: “Sophisticated phishing scams are a problem across the internet, and our teams use a variety of automated technology and trained investigation experts to detect and stop harmful behavior. Our free verification features enable members to make more informed decisions on who they’re interacting with. We also proactively share safety tips including how to report any suspicious messages to us, and how to enable the optional advanced safety feature which can help identify potentially harmful or fraudulent content.”

ForbesGoogle Security Gets Game As Inoculation Theory Put To The Test

Source: https://www.forbes.com/sites/daveywinder/2025/10/31/linkedin-dm-attack-warning—what-users-need-to-know/

Opportunità di mercato
Logo Octavia
Valore Octavia (VIA)
$0.002969
$0.002969$0.002969
0.00%
USD
Grafico dei prezzi in tempo reale di Octavia (VIA)
Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta crypto.news@mexc.com per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

Potrebbe anche piacerti

‘Sorry!' Dem lawmaker laughs off Trump-Epstein 'Freudian slip'

‘Sorry!' Dem lawmaker laughs off Trump-Epstein 'Freudian slip'

Rep. Melanie Stansbury (D-NM), an active leader in the House Oversight Committee’s ongoing probe into Jeffrey Epstein and his potential co-conspirators, laughed
Condividi
Rawstory2026/03/15 02:43
Why is crypto money flooding the 2026 midterm races?

Why is crypto money flooding the 2026 midterm races?

Tracking data from Follow The Crypto shows that the cryptocurrency industry has spent $271 million on causes expected to improve the odds of candidates that align
Condividi
Cryptopolitan2026/03/15 02:20
Vitalik: Staking means defending the blockchain, and there will inevitably be resistance when exiting

Vitalik: Staking means defending the blockchain, and there will inevitably be resistance when exiting

PANews reported on September 18th that in response to the discussion about the waiting time for staking, Ethereum co-founder Vitalik Buterin said: "Staking means taking on the solemn responsibility of defending the blockchain. Exit resistance is part of the protocol. This is not to say that the current staking queue design is optimal, but to say that if the relevant parameter settings are naively reduced, the credibility of the chain will be greatly reduced from the perspective of those nodes that are not often online." Data from the validatorqueue website shows that as of now, the number of ETH in the Ethereum PoS network exit queue is 2,496,141, with a waiting time of approximately 43 days and 8 hours. During the same period, the number of ETH waiting to be activated is 464,626, with an estimated activation delay of approximately 8 days and 2 hours.
Condividi
PANews2025/09/18 07:39