CrossClassify LogoCrossClassify

Last Updated on 20 Aug 2024

LinkedIn account takeovers and phishing scams

Share in

LinkedIn account takeovers and phishing scams img

LinkedIn has recently seen a dizzying increase in account takeover attacks in the last year. In 2022 already, phishing attacks on LI were already up 232% year on year.
In the last 12 months an initial campaign around mid-2023 propelled search terms such as “linkedin breach” or “linkedin account recovery” to multiple times their usual baseline traffic.
This SEO traffic has not abated and keeps surging forward, and new terms such as “linkedin contact number” suggest a tectonic rise in cyberattacks on the platform.
LinkedIn reportedly struggled to face the initial onslaught. At the height of the account takeover campaign, LI customer support teams were on occasion unable to get back to distraught users in less than 3 or 4 business days.

How do LinkedIn account takeover attacks work?

LinkedIn accounts have come under structural levels of cyber attacks most notably since mid-2023. Cyber criminals launched a structured campaign of systematic account takeovers, which expanded in scale over the last year.
As for most cyber criminality around account takeover, or account fraud, cybercriminals must first steal, or somehow come in possession of the user credentials (keyword, email, and/or mobile #). They did so far, mostly by:

Phishing / Advanced phishing and AI generated phishing

There are many techniques to steal credentials, but the most common one online is phishing, or AI type advanced phishing, its latest incarnation. Gen AI can now break a variety of cybersecurity such as 2D facial recognition or voice authentication.
It can also help cybercriminal design extremely compelling, virtually identical phishing messages (and landing pages) as those used by a valid company.
Here the cybercriminals used advanced phishing techniques to spoof LinkedIn emails that perfectly mimicked the visual tone of LI and sent those to LI users when they had their email.
They chose an appealing message, checking one’s profile views, spoofed to perfection (“Your LinkedIn profile appeared 24 times this week!”) to harvest further user data.

Man in the middle attacks

Users who had set up 2FA or MFA protection to their LinkedIn account were not particularly spared, many reporting first contact with the scammers through SMS.

Brute force and credential stuffing

Users who had only set up keyword/email authentication were much more commonly victims of brute-force attacks or keyword stuffing.
Brute force attacks involve the use of automated bots to test and identify credentials, in order to break into compromised accounts.
Credential stuffing is a terms used to describe another type of cyber criminal automation: This time cybercriminals may attempt all the combinations passwords/email addresses, they’ve found in a large data dump, on the dark web etc.

Social engineering

Users may be able at times to stick to a specific user for a while, in order to acquire gradually more and more personal data, and credentials, about them.
Social engineering is a very broad and “human” type of fraud, as it relies on real life interactions. A scammer may for example connect with you on Facebook, where they will gather a first layer of information should you approve them.
They can then move on to another social media platform, say X, attempt to connect on there also, using a highly custom message based on the information already gathered from FB. By then they can typically gather even more information on your profile, business and professional.
Finally they may attempt to “get closer” by connecting with you on a dating app, using precise geolocation targeting and knowing all about your physical appearance and tastes.
In this more private setting, the cybercriminal can then often extract further key information from the victim by pretending to be a potential date (mobile number, DOB, etc.)


Explore CrossClassify today

Detect and prevent fraud in real time

Protect your accounts with AI-driven security

Try CrossClassify for FREE—3 months

Share in

Frequently asked questions

LinkedIn phishing attacks surged 232% year on year by 2022, driven by the platform's high value for credential theft and professional impersonation. The account takeover protection solution detects and blocks unauthorized session activity in real time.

Attackers steal LinkedIn credentials through phishing, credential stuffing, or purchased session tokens, then lock out the legitimate owner by changing the email and password. The account takeover protection solution monitors behavioral and device signals to catch hijacked sessions before account changes are made.

LinkedIn accounts provide access to professional networks, job opportunities, and trusted communication channels that criminals exploit for impersonation and fraud. The behavioral biometrics solution detects anomalous post-login behavior that indicates a compromised or hijacked professional account.

LinkedIn phishing exploits the professional trust context, using fake job offers, recruiter messages, and connection requests to trick users into handing over credentials. The behavioral biometrics solution catches the abnormal session behavior that follows a successful phishing attack.

The device fingerprinting solution detects when an account is accessed from an unrecognized device, flagging potential takeover attempts before damage is done.

Bots automate fake connection requests, credential stuffing attacks, and mass phishing message delivery on LinkedIn at scale. The bot and abuse protection solution identifies non-human activity patterns that distinguish bot-driven fraud from genuine user behavior.

Session token theft and real-time phishing proxies can bypass MFA, giving attackers full account access without ever needing the second factor. The behavioral biometrics solution provides continuous post-login verification that closes the gap MFA leaves open.

Businesses should combine security awareness training with behavioral monitoring to detect compromised accounts before attackers can leverage professional networks for further fraud. The account takeover protection solution adds a detection layer that flags unusual session behavior linked to phishing-compromised accounts.

Attackers use hijacked LinkedIn accounts to scam connections, send phishing messages, harvest recruiter data, and impersonate the victim for financial fraud. The account takeover protection solution stops unauthorized sessions before attackers can weaponize the account.

Credential stuffing uses leaked username and password pairs from other breaches to automate login attempts against LinkedIn accounts at scale. The bot and abuse protection solution detects and blocks automated credential stuffing through behavioral and device signals.

The behavioral biometrics solution continuously verifies user identity by how they navigate and interact, catching attackers whose behavior differs from the account's legitimate owner.

Combining device fingerprinting, behavioral biometrics, and bot protection provides layered coverage from login through active session use. The account takeover protection solution is the core layer for stopping platform account fraud after authentication.
CrossClassify Logo

Let's Get Started

Discover how to secure your app against fraud using CrossClassify

No credit card required

CrossClassify

Fraud Detection System for Web and Mobile Apps

GDPR Ready imageGDPR Ready
SOC 2 Type II imageSOC 2 Type II (in progress)
Contacthello@crossclassify.com

25 King St, Bowen Hills, Brisbane QLD 4006, Australia

25 King St, Bowen
Hills, Brisbane QLD
4006, Australia


© 2025 CrossClassify. All rights reserved.

Privacy Policy