Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

5 Reasons Why Attackers Are Phishing Over LinkedIn

0
Medium
Phishing
Published: Mon Nov 17 2025 (11/17/2025, 11:55:00 UTC)
Source: The Hacker News

Description

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent campaigns seen targeting

AI-Powered Analysis

AILast updated: 11/17/2025, 13:43:18 UTC

Technical Analysis

Phishing attacks have evolved beyond email to exploit platforms like LinkedIn, which now account for approximately one-third of phishing incidents outside email. Attackers conduct sophisticated spear-phishing campaigns targeting company executives, particularly in financial services and technology sectors. LinkedIn’s direct messaging system bypasses traditional email security tools, leaving organizations blind to these threats. Attackers often hijack legitimate social media accounts, exploiting low multi-factor authentication adoption on personal apps to gain credibility and scale attacks using AI-generated messages. Reconnaissance on LinkedIn is straightforward, allowing attackers to identify high-value targets based on job roles and organizational structure. The professional nature of LinkedIn increases the likelihood of user engagement with malicious messages, especially when sent from compromised known contacts. Successful phishing can lead to compromise of enterprise cloud accounts such as Microsoft Entra and Google Workspace, enabling attackers to leverage single sign-on (SSO) to access multiple business applications and data. This can escalate into widespread breaches through lateral movement and further phishing within the organization. The challenge is compounded by rapid domain rotation for phishing sites and the inability to quarantine or recall messages on LinkedIn. The threat extends beyond LinkedIn to other decentralized communication channels, necessitating comprehensive detection strategies. The 2023 Okta breach exemplifies risks from personal account compromises on corporate devices, highlighting the need for controls on personal account usage. Overall, LinkedIn phishing represents a significant and underreported threat vector requiring new defensive approaches.

Potential Impact

For European organizations, the shift of phishing attacks to LinkedIn poses a substantial risk due to the platform’s widespread use for professional networking and business communications. Compromise of executive or privileged accounts can lead to unauthorized access to critical cloud services and enterprise applications, resulting in data breaches, financial loss, reputational damage, and regulatory penalties under GDPR. The stealthy nature of LinkedIn phishing, bypassing traditional email defenses, increases the likelihood of successful attacks and delayed detection. The potential for lateral movement within organizations can amplify the impact, affecting multiple departments and business units. Financial services and technology companies, which are prevalent in Europe’s major economies, are particularly attractive targets. Additionally, the use of personal devices and accounts for work purposes in hybrid work environments increases exposure. The difficulty in blocking or recalling malicious messages on LinkedIn complicates incident response and containment efforts. Overall, the threat can disrupt business operations and erode trust in digital communication channels.

Mitigation Recommendations

European organizations should adopt a multi-layered defense strategy tailored to the unique challenges of LinkedIn phishing. First, implement browser-based phishing detection solutions that analyze webpage behavior and user interactions in real time, blocking malicious content regardless of delivery channel. Enhance user awareness training to include social media phishing scenarios, emphasizing caution with LinkedIn messages even from known contacts. Enforce strict policies restricting the use of personal accounts on corporate devices and monitor for unauthorized logins to personal services from work environments. Deploy identity and access management controls such as conditional access policies and enforce multi-factor authentication across all accounts, including social media where possible. Integrate threat intelligence feeds that track phishing domains and attacker infrastructure to proactively block malicious URLs. Establish incident response procedures specific to social media phishing, including rapid reporting and account suspension workflows. Regularly audit and tighten SSO configurations and monitor for anomalous access patterns indicative of account compromise. Finally, encourage collaboration between security teams and HR or communications departments to raise awareness of emerging phishing tactics targeting executives.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/11/5-reasons-why-attackers-are-phishing.html","fetched":true,"fetchedAt":"2025-11-17T13:42:54.631Z","wordCount":2103}

Threat ID: 691b2660e3df22298b29a4d6

Added to database: 11/17/2025, 1:42:56 PM

Last enriched: 11/17/2025, 1:43:18 PM

Last updated: 11/21/2025, 2:16:17 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats