Site icon Panda Security Mediacenter

Why attackers are phishing on LinkedIn (and how to stop it)

why-attackers-are-phishing-on-linkedin-and-how-to-stop-it

Phishing isn’t just an email problem anymore. Attackers now use social media, search results, and messaging apps to reach victims, and research suggests that about 1 in 3 phishing attacks happen outside the inbox

LinkedIn has become a particularly attractive channel because it blends professional trust, easy access to corporate decision-makers, and direct messaging that many security teams can’t monitor the same way they do email. This article explains why LinkedIn phishing works so well and what practical steps you can take to reduce the risk of account compromise and downstream business impact.

Key takeaways

Why is LinkedIn phishing increasing?

LinkedIn phishing is rising because it combines “trusted” professional context with direct access to employees on devices they also use for work. Attackers specifically target business identities tied to platforms like Microsoft Entra and Google Workspace, which can lead to serious enterprise compromise. 

The result is a form of spear-phishing that targets a place where visibility, logging, and response options are weaker than they are for corporate email systems. There are five reasons this approach is so successful:

Reason 1: LinkedIn phishing bypasses traditional security tools 

LinkedIn DMs sidestep many defenses built around email gateways, email quarantine, and mail-based threat hunting. Security teams often have limited visibility into these messages, even when employees read them on corporate laptops and phones. When a malicious link is delivered via LinkedIn, defenders may be left playing “whack-a-mole” by blocking malicious URLs that are constantly rotated and updated by criminals. 

Reason 2: LinkedIn phishing is cheap, easy, and scalable 

Compared to email campaigns, where attackers may need to prep domains and build reputation, phishing on social platforms can be easier to spin up quickly. Using LinkedIn, attackers can hijack legitimate accounts and use them as credible launchpads, taking advantage of existing social connections and trust. AI-generated messages can make large-scale outreach more convincing with less effort. 

Reason 3: High-value targets are easy to find 

LinkedIn makes it easy to identify potential targets because roles, reporting lines, and responsibilities are often public. Attackers can use job titles and descriptions to identify people likely to have access to valuable systems and data. With no “assistant” filtering most inboxes, direct messages can become one of the fastest ways to reach the intended person directly – a specialized form of attack called ‘whaling’. 

Reason 4: People are more likely to engage 

LinkedIn is designed for connecting with outsiders, so an unexpected message doesn’t feel as suspicious as an unsolicited email. Some executives may be more likely to open and respond to a LinkedIn DM than another message in an overloaded inbox. If the message comes from a hijacked account belonging to a known contact (or even a coworker), the social proof can further reduce skepticism. 

Reason 5: The rewards can be enormous 

Phishing often aims at core cloud identities (Microsoft, Google) and identity providers like Okta. Because one stolen login can lead to broad access. Once an attacker controls a primary identity, SSO can open the door to many connected business apps and datasets. The personal-to-work account crossover of LinkedIn can create a bridge to corporate compromise too.

How to reduce LinkedIn phishing risk

Conclusion

LinkedIn phishing works because it blends trust, targeting, and weak visibility into one fast-moving channel. And the underlying goal is often to steal cloud identities that unlock the rest of the business. For stronger protection, combine user verification habits, MFA, and incident-ready reporting processes to protect across a wide range of channels – not just email.

Exit mobile version