Why attackers are phishing on LinkedIn (and how to stop it)

375 views

Phishing isn’t just an email problem anymore. Attackers now use social media, search results, and messaging apps to reach victims, and research suggests that about…

Panda SecurityJan 7, 20264 min read

Phishing isn’t just an email problem anymore. Attackers now use social media, search results, and messaging apps to reach victims, and research suggests that about 1 in 3 phishing attacks happen outside the inbox

LinkedIn has become a particularly attractive channel because it blends professional trust, easy access to corporate decision-makers, and direct messaging that many security teams can’t monitor the same way they do email. This article explains why LinkedIn phishing works so well and what practical steps you can take to reduce the risk of account compromise and downstream business impact.

Key takeaways

  • LinkedIn messages can bypass traditional email-focused security controls.
  • LinkedIn attacks are cheap, simple and fully scalable using hijacked accounts and convincing, AI-written messages.
  • LinkedIn makes it easy to identify and reach high-value targets like executives and admins.
  • People are more likely to engage on a networking platform than in a crowded email inbox. 
  • A single stolen login can unlock SSO-connected apps and escalate into a major security breach.

Why is LinkedIn phishing increasing?

LinkedIn phishing is rising because it combines “trusted” professional context with direct access to employees on devices they also use for work. Attackers specifically target business identities tied to platforms like Microsoft Entra and Google Workspace, which can lead to serious enterprise compromise. 

The result is a form of spear-phishing that targets a place where visibility, logging, and response options are weaker than they are for corporate email systems. There are five reasons this approach is so successful:

Reason 1: LinkedIn phishing bypasses traditional security tools 

LinkedIn DMs sidestep many defenses built around email gateways, email quarantine, and mail-based threat hunting. Security teams often have limited visibility into these messages, even when employees read them on corporate laptops and phones. When a malicious link is delivered via LinkedIn, defenders may be left playing “whack-a-mole” by blocking malicious URLs that are constantly rotated and updated by criminals. 

Reason 2: LinkedIn phishing is cheap, easy, and scalable 

Compared to email campaigns, where attackers may need to prep domains and build reputation, phishing on social platforms can be easier to spin up quickly. Using LinkedIn, attackers can hijack legitimate accounts and use them as credible launchpads, taking advantage of existing social connections and trust. AI-generated messages can make large-scale outreach more convincing with less effort. 

Reason 3: High-value targets are easy to find 

LinkedIn makes it easy to identify potential targets because roles, reporting lines, and responsibilities are often public. Attackers can use job titles and descriptions to identify people likely to have access to valuable systems and data. With no “assistant” filtering most inboxes, direct messages can become one of the fastest ways to reach the intended person directly – a specialized form of attack called ‘whaling’. 

Reason 4: People are more likely to engage 

LinkedIn is designed for connecting with outsiders, so an unexpected message doesn’t feel as suspicious as an unsolicited email. Some executives may be more likely to open and respond to a LinkedIn DM than another message in an overloaded inbox. If the message comes from a hijacked account belonging to a known contact (or even a coworker), the social proof can further reduce skepticism. 

Reason 5: The rewards can be enormous 

Phishing often aims at core cloud identities (Microsoft, Google) and identity providers like Okta. Because one stolen login can lead to broad access. Once an attacker controls a primary identity, SSO can open the door to many connected business apps and datasets. The personal-to-work account crossover of LinkedIn can create a bridge to corporate compromise too.

How to reduce LinkedIn phishing risk

  • Treat LinkedIn messages like email: verify requests for logins, documents, payments, or “urgent approvals” using a second channel.   
  • Tighten account security: enable MFA on LinkedIn and on the cloud accounts attackers want (Microsoft/Google/Okta) to reduce the impact of stolen passwords.
  • Train for “non-email phishing”: include social DMs in awareness exercises since a significant share of phishing happens outside the inbox.   

Conclusion

LinkedIn phishing works because it blends trust, targeting, and weak visibility into one fast-moving channel. And the underlying goal is often to steal cloud identities that unlock the rest of the business. For stronger protection, combine user verification habits, MFA, and incident-ready reporting processes to protect across a wide range of channels – not just email.