Monday, November 25, 2024
HomePhishingNew Fake Email Phishing Scam Attack LinkedIn Users - Beware

New Fake Email Phishing Scam Attack LinkedIn Users – Beware

Published on

[jpshare]Fake Email phishing attack hitting LinkedIn users via Mail and LinkedIn inbox’s  and ask them to attach the CV. Since its looks like an original link which come from official LinkedIn, its leads to  many users to be victimized by this Email  phishing Attack .

It is decent to believe that beneficiaries of the false message would detect various cautioning signals when they open the correspondence in their email inbox.

Attackers have spammed out email messages posing as communications from LinkedIn, claiming that a company is “urgently seeking” workers matching your qualifications in “your region”.

- Advertisement - SIEM as a Service
Be that as it may, there’s dependably a possibility that somebody Eager to discover new employment may not see that the messages whether it is original Link or not.

The site (at https://linkedinjobs.jimdo.com) to which the underlying messages indicated has as of now been brought down, yet you can make certain that the scammers have already set up new ones, and changed the connection in hence sent messages .

Accoring to  Total Defence “Phone numbers can be sold for companies doing promotional cold calling. Or, the cyber criminal might call you himself in a vishing attack.

In other cases, he might use the information for identity theft, using the companies you worked at or attached references as a cover for fraudulent activities.”

By having Victims personal information link , your full name, date of birth, work and home email addresses, work and home telephone numbers, and all manner of other personal information that could be abused by scammers.

According to HELPNETSECURITY The scammers  are attempting to impersonate the well known  employment-oriented social networking service, however cautious clients will instantly spot numerous things that indicate the email being fake:

  • The email sender address that has nothing to do with LinkedIn
  • The lack of certain design elements and the “unsubscribe” footer usually contained in LinkedIn emails
  • The email not addressing the recipient by name
  • A sense of urgency that the email is designed to create
  • Typos, and so on.

Total Defense warns about Phishing scams ,

  • Non-existing organizations reaching users straightforwardly with employment offers for which they haven’t connected (as in this last LinkedIn trick),
  • Insecure sites (no HTTPS to protect the information imputed into job application forms)
  • Follow-up messages requesting more delicate data (e.g. financial balance number to set up direct store)

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

5 Hackers Charged for Attacking Companies via Phishing Text Messages

Federal authorities have unsealed charges against five individuals accused of orchestrating sophisticated phishing schemes...