• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » LinkedIn Impersonation Scam May Lead to Identity Theft

LinkedIn Impersonation Scam May Lead to Identity Theft

2021-02-01 by Michelle Dvorak

LinkedIn Impersonation Scam

Fake LinkedIn Notification Steals personal Information

Note: We may earn a commission from products or services when you click on a link and make a purchase.

A LinkedIn impersonation scam is making the rounds online. Cybercriminals are attempting to steal highly sensitive personal information from LinkedIn users.

In this scam, cybercriminals send a phishing email that impersonates a LinkedIn notification. Messaging in the phishing email informs the user there has been a policy change on LinkedIn that affects them. The email contains an attachment that supposedly contains information about the changes.

This LinkedIn impersonation scam uses a convincing web page designed to look like it is an official LinkedIn page.

Motley Fool Stock Advisor

The subject line says, “Changes that affect you.”

The victim is encouraged to open an email attachment to read the policy change.

RELATED READ Iranian Hackers Impersonating Journalists on LinkedIn, WhatsApp

The email attachment is a file with the name “PolicyChange2845.”

“…in this attack, attackers rely on the reputability and trust bestowed in social media and networking platforms, such as LinkedIn,” says cyber security researchers from Abnormal Security who discovered the attack.

If the victim is tricked by the LinkedIn phishing scam and opens the email attachment, they are redirected to a spoofed LinkedIn web form. The form impersonates LinkedIn using the company’s logo and familiar blue color scheme.

The use of the logo in color scheme makes it look almost identical to any form that would appear on the official LinkedIn site.

The fake LinkedIn form prompts the reader to enter in their full name, Social Security number, birthdate, and drivers’ license number.

If the victim his tricked by this LinkedIn impersonation scam and enters their sensitive information in the web form, their response is sent directly to the cybercriminals. This leaves them vulnerable to future phishing scams and identity theft.

Both of these schemes can result in financial losses.

How to Avoid a LinkedIn Impersonation Scam

  1. Never click on a link in an email link, even when you think it is official communications sent by a company that you shop from or otherwise do business with.
  2. To read notifications visit the company’s official website. Log into your account and read the notifications from there
  3. Use an antivirus app to help detect phishing emails and harmful web pages. Cybercriminals frequently use fake web pages that look exactly like legitimate corporate sites
  4. Use a virtual private network (VPN) like Ivacy VPN to help protect your sensitive information
  5. Don’t email sensitive documents that contain information like government ID numbers, birth dates, or copies of your identification

Filed Under: News Tagged With: LinkedIn, phishing

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version