Highlights

  • Hackers easily connect with new users
  • Send malicious files for download via messages
  • Stealer malware gets installed in the victim's computer

Latest news

Diksha Dagar Shines in Dream Start at 2025 Women's Scottish Open

Diksha Dagar Shines in Dream Start at 2025 Women's Scottish Open

University of New Mexico Shooting Leaves 1 Dead, 1 Injured

University of New Mexico Shooting Leaves 1 Dead, 1 Injured

Veda Krishnamurthy Bids Farewell to Professional Cricket

Veda Krishnamurthy Bids Farewell to Professional Cricket

Pakistan Army Chief's Strategic China Visit: Strengthened Ties

Pakistan Army Chief's Strategic China Visit: Strengthened Ties

Kichcha's Kings Bengaluru Joins India's Racing League

Kichcha's Kings Bengaluru Joins India's Racing League

Britain, France, Germany to Address Gaza Crisis Amid Diplomatic Tensions

Britain, France, Germany to Address Gaza Crisis Amid Diplomatic Tensions

Austrian Acquaintance of Concert Plot Suspect Convicted

Austrian Acquaintance of Concert Plot Suspect Convicted

David Gower Praises Rishabh Pant's Elevation of Left-Hand Batting Standards

David Gower Praises Rishabh Pant's Elevation of Left-Hand Batting Standards

Hackers are using LinkedIn to steal user data

Since many LinkedIn users accept new connections without verifying them, hackers are able to connect with new people and send them malicious files. 

Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
    • Chapters
    • descriptions off, selected
    • captions off, selected

      New research has revealed that hackers are using Microsoft's LinkedIn to propagate data-stealing malware by making connection requests in the guise of employees of reputable firms.

      Researchers from the AI cyber-security firm CloudSEK discovered that scammers are using LinkedIn's chat and job posting functions to distribute links/files containing stealer malware.

      Since the majority of LinkedIn users accept all connection requests, fraudsters may simply make relationships and establish their reputation on the network.

      After establishing their trustworthiness, hackers distribute infected files and links, which are subsequently opened by victims who are unaware of the danger.

      Once opened, stealer malware is placed on the victim's PC, stealing passwords, credit card details, and other sensitive data before sending it to the threat actors.

      The compromised social media and email accounts of the victim are then taken over with the stolen credentials.

      It is recommended that all users verify connection requests before to accepting them, even if the requestor is linked to someone you know.

      Before accessing documents and files exchanged on LinkedIn, it is equally important to screen them for malware.

      Also watch: Samsung Galaxy Z Fold4 Review

      LinkedIn

      ADVERTISEMENT

      Up Next

      Hackers are using LinkedIn to steal user data

      Hackers are using LinkedIn to steal user data

      Realme 15 Pro Review ft. OnePlus Nord CE 5 & Nothing Phone 3a: One mid-ranger to rule them all!

      Realme 15 Pro Review ft. OnePlus Nord CE 5 & Nothing Phone 3a: One mid-ranger to rule them all!

      iQOO Z10R Review in 5 Simple Points: What You Need to Know

      iQOO Z10R Review in 5 Simple Points: What You Need to Know

      Infinix Hot 60 5G+ Review: Smart, Fast, and Surprisingly Polished

      Infinix Hot 60 5G+ Review: Smart, Fast, and Surprisingly Polished

      Oppo Reno14 Series is tailor-made for creators on the go. Here’s why

      Oppo Reno14 Series is tailor-made for creators on the go. Here’s why

      Samsung Galaxy Z Fold 7 Review: Slimmer, lighter, better in (almost) every way

      Samsung Galaxy Z Fold 7 Review: Slimmer, lighter, better in (almost) every way

      ADVERTISEMENT

      editorji-whatsApp

      More videos

      Samsung Galaxy Z Flip7 ASMR unboxing & first look: Chic style with fun vibes

      Samsung Galaxy Z Flip7 ASMR unboxing & first look: Chic style with fun vibes

      Samsung Galaxy Z Fold7 vs Vivo X Fold5: Which foldable flagship wins in 2025?

      Samsung Galaxy Z Fold7 vs Vivo X Fold5: Which foldable flagship wins in 2025?

      Vivo X Fold 5 Unboxing & First Impressions: Slimmer & Sharper

      Vivo X Fold 5 Unboxing & First Impressions: Slimmer & Sharper

      Snapdragon’s XR Day lands in India with a big bet on extended reality

      Snapdragon’s XR Day lands in India with a big bet on extended reality

      Vivo X200 FE Review ft. OnePlus 13S & Oppo Reno 14 Pro: The all-rounder that surprises

      Vivo X200 FE Review ft. OnePlus 13S & Oppo Reno 14 Pro: The all-rounder that surprises

      Infinix Hot 60 5G+ First Impressions: A budget phone, with boss energy

      Infinix Hot 60 5G+ First Impressions: A budget phone, with boss energy

      Samsung's Galaxy Z Fold7 and Flip7 First Impressions: What’s new?

      Samsung's Galaxy Z Fold7 and Flip7 First Impressions: What’s new?

      Amazon Prime Day 2025: 7 best smartphone deals you can't miss

      Amazon Prime Day 2025: 7 best smartphone deals you can't miss

      Samsung’s Galaxy Z Fold7 and Flip7 get major upgrades—but the new Flip7 FE steals the spotlight

      Samsung’s Galaxy Z Fold7 and Flip7 get major upgrades—but the new Flip7 FE steals the spotlight

      OnePlus Nord CE5 Review: Not flashy, but it seriously delivers

      OnePlus Nord CE5 Review: Not flashy, but it seriously delivers

      Editorji Technologies Pvt. Ltd. © 2022 All Rights Reserved.