Monday, May 12, 2025
HomePhishingNew Fake Email Phishing Scam Attack LinkedIn Users - Beware

New Fake Email Phishing Scam Attack LinkedIn Users – Beware

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]Fake Email phishing attack hitting LinkedIn users via Mail and LinkedIn inbox’s  and ask them to attach the CV. Since its looks like an original link which come from official LinkedIn, its leads to  many users to be victimized by this Email  phishing Attack .

It is decent to believe that beneficiaries of the false message would detect various cautioning signals when they open the correspondence in their email inbox.

Attackers have spammed out email messages posing as communications from LinkedIn, claiming that a company is “urgently seeking” workers matching your qualifications in “your region”.

- Advertisement - Google News
Be that as it may, there’s dependably a possibility that somebody Eager to discover new employment may not see that the messages whether it is original Link or not.

The site (at https://linkedinjobs.jimdo.com) to which the underlying messages indicated has as of now been brought down, yet you can make certain that the scammers have already set up new ones, and changed the connection in hence sent messages .

Accoring to  Total Defence “Phone numbers can be sold for companies doing promotional cold calling. Or, the cyber criminal might call you himself in a vishing attack.

In other cases, he might use the information for identity theft, using the companies you worked at or attached references as a cover for fraudulent activities.”

By having Victims personal information link , your full name, date of birth, work and home email addresses, work and home telephone numbers, and all manner of other personal information that could be abused by scammers.

According to HELPNETSECURITY The scammers  are attempting to impersonate the well known  employment-oriented social networking service, however cautious clients will instantly spot numerous things that indicate the email being fake:

  • The email sender address that has nothing to do with LinkedIn
  • The lack of certain design elements and the “unsubscribe” footer usually contained in LinkedIn emails
  • The email not addressing the recipient by name
  • A sense of urgency that the email is designed to create
  • Typos, and so on.

Total Defense warns about Phishing scams ,

  • Non-existing organizations reaching users straightforwardly with employment offers for which they haven’t connected (as in this last LinkedIn trick),
  • Insecure sites (no HTTPS to protect the information imputed into job application forms)
  • Follow-up messages requesting more delicate data (e.g. financial balance number to set up direct store)

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear...

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...