Highlights

  • Hackers easily connect with new users
  • Send malicious files for download via messages
  • Stealer malware gets installed in the victim's computer

Latest news

Oakley Meta HSTN Smart Glasses Review: The Most Livable Smart Glasses Yet?

Oakley Meta HSTN Smart Glasses Review: The Most Livable Smart Glasses Yet?

Meghalaya mine blast: Two persons arrested as CM warns of strict action

Meghalaya mine blast: Two persons arrested as CM warns of strict action

Tamil Nadu on high alert following reports of large-scale crow deaths in state

Tamil Nadu on high alert following reports of large-scale crow deaths in state

Divine Drop Festival moves beyond bhajan-only format at Gurugram event

Divine Drop Festival moves beyond bhajan-only format at Gurugram event

Lata Mangeshkar: Remembering the voice that defined Indian music

Lata Mangeshkar: Remembering the voice that defined Indian music

Delhi Police dismisses reports of surge in missing girls, says hype driven by paid promotions

Delhi Police dismisses reports of surge in missing girls, says hype driven by paid promotions

Lok Sabha adjourned for the day amid unabated protests by the Opposition

Lok Sabha adjourned for the day amid unabated protests by the Opposition

'Shatak' Teaser Unveils the Untold Story of a Century-Long Journey of the RSS

'Shatak' Teaser Unveils the Untold Story of a Century-Long Journey of the RSS

Hackers are using LinkedIn to steal user data

Since many LinkedIn users accept new connections without verifying them, hackers are able to connect with new people and send them malicious files. 

Hackers are using LinkedIn to steal user data

New research has revealed that hackers are using Microsoft's LinkedIn to propagate data-stealing malware by making connection requests in the guise of employees of reputable firms.

Researchers from the AI cyber-security firm CloudSEK discovered that scammers are using LinkedIn's chat and job posting functions to distribute links/files containing stealer malware.

Since the majority of LinkedIn users accept all connection requests, fraudsters may simply make relationships and establish their reputation on the network.

After establishing their trustworthiness, hackers distribute infected files and links, which are subsequently opened by victims who are unaware of the danger.

Once opened, stealer malware is placed on the victim's PC, stealing passwords, credit card details, and other sensitive data before sending it to the threat actors.

The compromised social media and email accounts of the victim are then taken over with the stolen credentials.

It is recommended that all users verify connection requests before to accepting them, even if the requestor is linked to someone you know.

Before accessing documents and files exchanged on LinkedIn, it is equally important to screen them for malware.

Also watch: Samsung Galaxy Z Fold4 Review

ADVERTISEMENT

Up Next

Hackers are using LinkedIn to steal user data

Hackers are using LinkedIn to steal user data

Oakley Meta HSTN Smart Glasses Review: The Most Livable Smart Glasses Yet?

Oakley Meta HSTN Smart Glasses Review: The Most Livable Smart Glasses Yet?

Lava Blaze Duo 3 review: Two displays for the price of one, but does it make sense?

Lava Blaze Duo 3 review: Two displays for the price of one, but does it make sense?

Redmi Note 15 Pro+ Review: A serious upgrade that plays it safe

Redmi Note 15 Pro+ Review: A serious upgrade that plays it safe

Vivo X200T vs Vivo X200 FE: Future-ready muscle or compact finesse?

Vivo X200T vs Vivo X200 FE: Future-ready muscle or compact finesse?

Redmi Note 15 Pro+ First Look: Bigger battery, brighter screen, sharper focus

Redmi Note 15 Pro+ First Look: Bigger battery, brighter screen, sharper focus

ADVERTISEMENT

editorji-whatsApp

More videos

Realme Buds Clip review: Surprisingly good, if you know what you’re buying

Realme Buds Clip review: Surprisingly good, if you know what you’re buying

Realme P4 Power 5G Review:29 Hours later, it still wouldn’t die

Realme P4 Power 5G Review:29 Hours later, it still wouldn’t die

Vivo X200T Review: A new kind of flagship in Vivo’s lineup

Vivo X200T Review: A new kind of flagship in Vivo’s lineup

Realme Pad 3 5G review: A productivity tablet that finally makes sense

Realme Pad 3 5G review: A productivity tablet that finally makes sense

Realme P4 Power 5G First Look: 10,001mAh battery, crammed into a slim design

Realme P4 Power 5G First Look: 10,001mAh battery, crammed into a slim design

Zeiss Batis 85mm f/1.8 and Batis 18mm f/2.8 review: Built for purists

Zeiss Batis 85mm f/1.8 and Batis 18mm f/2.8 review: Built for purists

GoPro Max 2 Review: GoPro’s Most Creative Camera Yet

GoPro Max 2 Review: GoPro’s Most Creative Camera Yet

Logitech MX Master 4 Review: A masterclass on improving perfection

Logitech MX Master 4 Review: A masterclass on improving perfection

X implements tech measures to prevent Grok from generating sexualised AI content

X implements tech measures to prevent Grok from generating sexualised AI content

CMF Headphone Pro review: Big style, bigger battery, bold sound all for ₹7,999

CMF Headphone Pro review: Big style, bigger battery, bold sound all for ₹7,999

Editorji Technologies Pvt. Ltd. © 2022 All Rights Reserved.