- Hackers exploit LinkedIn notifications to trick users into providing login credentials
- Phishing emails are often time-sensitive job opportunities to manipulate recipients.
- Fraudulent domains like “inedin[.]digital » imitate LinkedIn to gain trust
Experts have warned that hackers are increasingly exploiting LinkedIn notifications to trick users into providing sensitive login information, using highly realistic emails that mimic legitimate alerts.
New research from Cofense shows how these campaigns often present themselves as job opportunities, exploiting urgency and curiosity to manipulate recipients into interacting with malicious links.
Attackers primarily rely on emotional triggers to circumvent rational caution and gain access to accounts.
Article continues below
Attackers manipulate emotions to circumvent user caution
Malicious emails often appear to come from recruiters at reputable companies, with convincing logos, fonts, and formatting.
The research team noted that even the smallest details are deliberately copied from authentic LinkedIn pages to create trust, with the fake “inedin” domain.[.]digital” looks a lot like the legitimate LinkedIn website.
Fraudulent sender addresses, such as “khanieteam[.]com,” are similarly designed to avoid immediate suspicion, even if they have no affiliation with LinkedIn.
Many of the fake websites and email accounts were created months or even days before the attacks, showing how quickly bad actors can deploy new campaigns.
These attackers are not static; they are constantly refining their technical sophistication to reach their target.
Cofense also reports that campaigns are increasingly incorporating publicly available personal data, including home addresses and mapped locations, to build credibility.
In one notable example, attackers embedded screenshots of Google Maps in extortion emails, a deceptive move aimed at convincing recipients.
Personalization and automation make these campaigns both less expensive and faster to launch than traditional phishing attacks.
Cofense has provided technical details, including email Indicators of Compromise (IOCs), lists of observed IP addresses, and payload URLs, to help cybersecurity professionals detect and mitigate these schemes.
Phishing emails are often translated from other languages, such as Chinese, demonstrating the global reach of these campaigns.
Even minimal delays in analyzing these attacks can result in compromised credentials; organizations must therefore implement a rapid response.
Being aware of malware threats is essential because attackers often use them to steal credentials and compromise devices.
Users are advised to remain vigilant when receiving unexpected LinkedIn notifications and verify the authenticity of senders before clicking on links.
Cofense recommends combining human intelligence with automated threat detection to enable security teams to neutralize campaigns before they have widespread impact.
Regularly updated antivirus software can provide an extra layer of protection against malicious attachments and harmful links.
Security experts emphasize the importance of carefully verifying URLs, avoiding shortcuts to login pages, and confirming communications through official channels.
A robust firewall can also help block unauthorized access and prevent attackers from exploiting system vulnerabilities.
That said, thinking twice before interacting with such emails remains the most effective measure against increasingly convincing phishing attacks.
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




