LinkedIn phishing attacks have surged 232% since start of February
Hackers are tricking users into clicking on fake LinkedIn alerts in an effort to steal login information


Email phishing attacks that use the LinkedIn brand have increased by 232% since 1 February, 2022, research has revealed.
The attacks tend to use display name spoofing and stylised HTML templates to socially engineer victims into clicking on phishing links and then entering their credentials into fraudulent websites, according to cyber security firm Egress.
The emails use targeted subject lines associated with LinkedIn, including “You appeared in 4 searches this week” or “You have 1 new message”. The emails contain the LinkedIn logo and brand colours, as well as using other well-known organisation names, like American Express, to make the attacks more convincing.
When clicked, the phishing links send the victim to a website that harvests their LinkedIn log-in credentials, according to the research.
Current employment trends are making these kinds of attacks more convincing, with the research citing how “The Great Resignation” continues to dominate headlines as a record number of US citizens left their jobs in 2021 for new opportunities.
“It is likely these phishing attacks aim to capitalise on jobseekers (plus curious individuals) by flattering them into believing their profile is being viewed and their experience is relevant to household brands,” Egress stated in its report.
Although the display name is always LinkedIn and the emails follow a similar pattern, they are sent from different webmail addresses.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The security company said that it’s unknown whether these attacks are the work of one cyber criminal or a gang operating together. However, most targets are companies in North America and the UK, operating across a variety of industries.
Egress advised that individuals should take extreme caution when reading notification emails that request them to click on a hyperlink, especially on mobile devices. It recommends hovering over links before clicking on them to ensure they are going to a trusted source, and going directly to LinkedIn to check for messages and updates.
Last month, DHL overtook Microsoft as the most frequently mimicked brand for phishing attacks, accounting for 23% of all phishing attempts. Microsoft accounted for only 20% of all attempts, down from 29% the previous quarter. LinkedIn came fifth in the rankings, accounting for 8% of all phishing attempts.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
The FBI says hackers are using AI voice clones to impersonate US government officials
News The campaign uses AI voice generation to send messages pretending to be from high-ranking figures
-
Employee phishing training is working – but don’t get complacent
News Educating staff on how to avoid phishing attacks can cut the rate by 80%
-
Russian hackers tried to lure diplomats with wine tasting – sound familiar? It’s an update to a previous campaign by the notorious Midnight Blizzard group
News The Midnight Blizzard threat group has been targeting European diplomats with malicious emails offering an invite to wine tasting events, according to Check Point.
-
This hacker group is posing as IT helpdesk workers to target enterprises – and researchers warn its social engineering techniques are exceptionally hard to spot
News The Luna Moth hacker group is ramping up attacks on firms across a range of industries with its 'callback phishing' campaign, according to security researchers.
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
-
State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique
News State-sponsored hackers from North Korea, Iran, and Russia are exploiting the ‘ClickFix’ social engineering technique for the first time – and to great success.
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.