The Rise of LinkedIn Phishing: A New Threat to Businesses
Phishing attacks are evolving, and LinkedIn has become a prime target. While email has long been the go-to channel for phishing, attackers are now turning to social media platforms, and LinkedIn is a hotbed for these malicious activities. But why LinkedIn? Here are five reasons why attackers are phishing over LinkedIn, and why it's a growing concern for businesses.
- Bypassing Traditional Security Measures: LinkedIn Direct Messages (DMs) sidestep the email security tools that organizations rely on. Employees often access LinkedIn on work devices, but security teams lack visibility into these communications. This allows attackers to message employees on their work devices without the risk of email interception, making it a stealthy entry point.
But it gets more concerning. Modern phishing kits employ advanced techniques to evade detection, leaving organizations vulnerable. When a LinkedIn phish is reported, it's challenging to track and contain the attack. You can't recall or quarantine messages, block senders, or modify rules. The attacker has likely already achieved their goal and moved on, leaving little recourse.
Cost-Effective and Scalable: Phishing over LinkedIn is more accessible than email-based attacks. Instead of creating new email domains and warming them up, attackers can simply hijack legitimate social media accounts. Shockingly, 60% of credentials in infostealer logs are linked to social media accounts, many without Multi-Factor Authentication (MFA). This provides attackers with a ready-made network of connections, making it easier to launch large-scale campaigns.
See AlsoChina Accused of Using Anthropic AI for Cyberattacks | AI Weaponized?British Hacker Ordered to Repay £4M in Bitcoin Scam | Twitter Hack ExplainedRussian Hacker Denis Obrezko Arrested in Thailand for US Extradition - Void Blizzard Cyber Espionage⚠️ 79% of Travellers Risk Data Breaches by Doing THIS! (UAE Cyber Security Council Warning)Access to High-Value Targets: LinkedIn is a treasure trove for attackers seeking high-value targets. It's a simple process to map out an organization's LinkedIn profiles and identify key individuals. With no spam protection or inbox screening, LinkedIn is the perfect platform for launching highly targeted spear-phishing attacks.
Higher Success Rates: Professional networking apps like LinkedIn foster an environment of trust. Users are more likely to engage with connections outside their organization, making them more susceptible to phishing attempts. When combined with account hijacking, messages from known contacts can be incredibly effective, leading to a higher likelihood of a successful attack.
Significant Payoffs: Don't be fooled by the 'personal' nature of LinkedIn. The potential rewards for attackers are massive. By compromising an account, they gain access to core business functions and datasets, leveraging Single Sign-On (SSO) to infiltrate connected apps. This can quickly escalate into a multi-million-dollar breach, affecting the entire organization.
And here's the part most people miss: these attacks aren't limited to LinkedIn. With the rise of decentralized internet apps and diverse communication channels, attackers have more opportunities than ever. They can deliver malicious links via instant messaging, social media, SMS, and even SaaS services, bypassing traditional email-based security checks.
So, what can be done? Organizations need a security solution that detects and blocks phishing across all apps and channels. Push Security offers a unique approach by analyzing page code, behavior, and user interaction in real time, shutting down attacks as they happen. It also provides proactive vulnerability detection and remediation, ensuring a comprehensive defense.
But the question remains: how can we stay ahead of these evolving threats? As phishing techniques become more sophisticated, the challenge of protecting businesses grows. Are we prepared for the next wave of phishing attacks?