Saturday, May 31, 2025
HomePhishingNew Fake Email Phishing Scam Attack LinkedIn Users - Beware

New Fake Email Phishing Scam Attack LinkedIn Users – Beware

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]Fake Email phishing attack hitting LinkedIn users via Mail and LinkedIn inbox’s  and ask them to attach the CV. Since its looks like an original link which come from official LinkedIn, its leads to  many users to be victimized by this Email  phishing Attack .

It is decent to believe that beneficiaries of the false message would detect various cautioning signals when they open the correspondence in their email inbox.

Attackers have spammed out email messages posing as communications from LinkedIn, claiming that a company is “urgently seeking” workers matching your qualifications in “your region”.

- Advertisement - Google News
Be that as it may, there’s dependably a possibility that somebody Eager to discover new employment may not see that the messages whether it is original Link or not.

The site (at https://linkedinjobs.jimdo.com) to which the underlying messages indicated has as of now been brought down, yet you can make certain that the scammers have already set up new ones, and changed the connection in hence sent messages .

Accoring to  Total Defence “Phone numbers can be sold for companies doing promotional cold calling. Or, the cyber criminal might call you himself in a vishing attack.

In other cases, he might use the information for identity theft, using the companies you worked at or attached references as a cover for fraudulent activities.”

By having Victims personal information link , your full name, date of birth, work and home email addresses, work and home telephone numbers, and all manner of other personal information that could be abused by scammers.

According to HELPNETSECURITY The scammers  are attempting to impersonate the well known  employment-oriented social networking service, however cautious clients will instantly spot numerous things that indicate the email being fake:

  • The email sender address that has nothing to do with LinkedIn
  • The lack of certain design elements and the “unsubscribe” footer usually contained in LinkedIn emails
  • The email not addressing the recipient by name
  • A sense of urgency that the email is designed to create
  • Typos, and so on.

Total Defense warns about Phishing scams ,

  • Non-existing organizations reaching users straightforwardly with employment offers for which they haven’t connected (as in this last LinkedIn trick),
  • Insecure sites (no HTTPS to protect the information imputed into job application forms)
  • Follow-up messages requesting more delicate data (e.g. financial balance number to set up direct store)

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack

Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging...

UTG-Q-015 Hackers Launch Massive Brute-Force Attacks on Government Web Servers

The hacker group UTG-Q-015, first identified in December 2024 for mounting attacks on major...