Highlights

  • Hackers easily connect with new users
  • Send malicious files for download via messages
  • Stealer malware gets installed in the victim's computer

Latest news

Future Netwings Solution Enhances Service Delivery with the Business Continuity Policy

Future Netwings Solution Enhances Service Delivery with the Business Continuity Policy

India-UK trade deal likely by May 1; Europe deal expected by year-end

India-UK trade deal likely by May 1; Europe deal expected by year-end

VerSe Innovation Appoints Prasanna Prasad as Chief Product and Technology Officer to Accelerate AI-Led Product and Platform Innovation

VerSe Innovation Appoints Prasanna Prasad as Chief Product and Technology Officer to Accelerate AI-Led Product and Platform Innovation

Changing Aspirations of Premium Homebuyers in NCR

Changing Aspirations of Premium Homebuyers in NCR

Airfloa Rail Technology's FY26 Business Update and Strategic Direction

Airfloa Rail Technology's FY26 Business Update and Strategic Direction

Sanjay Khanna Appointed as Chairman & Managing Director of BPCL

Sanjay Khanna Appointed as Chairman & Managing Director of BPCL

Galgotias University Placement Report: 4700+ Offers Across Top Recruiters in 2026

Galgotias University Placement Report: 4700+ Offers Across Top Recruiters in 2026

"Be the same loving brother you are to me...": Sanjay Dutt pens heartfelt birthday note for Anant Ambani

"Be the same loving brother you are to me...": Sanjay Dutt pens heartfelt birthday note for Anant Ambani

Hackers are using LinkedIn to steal user data

Since many LinkedIn users accept new connections without verifying them, hackers are able to connect with new people and send them malicious files. 

Hackers are using LinkedIn to steal user data

New research has revealed that hackers are using Microsoft's LinkedIn to propagate data-stealing malware by making connection requests in the guise of employees of reputable firms.

Researchers from the AI cyber-security firm CloudSEK discovered that scammers are using LinkedIn's chat and job posting functions to distribute links/files containing stealer malware.

Since the majority of LinkedIn users accept all connection requests, fraudsters may simply make relationships and establish their reputation on the network.

After establishing their trustworthiness, hackers distribute infected files and links, which are subsequently opened by victims who are unaware of the danger.

Once opened, stealer malware is placed on the victim's PC, stealing passwords, credit card details, and other sensitive data before sending it to the threat actors.

The compromised social media and email accounts of the victim are then taken over with the stolen credentials.

It is recommended that all users verify connection requests before to accepting them, even if the requestor is linked to someone you know.

Before accessing documents and files exchanged on LinkedIn, it is equally important to screen them for malware.

Also watch: Samsung Galaxy Z Fold4 Review

ADVERTISEMENT

Up Next

Hackers are using LinkedIn to steal user data

Hackers are using LinkedIn to steal user data

OnePlus Nord 6 Review: The new endurance king that almost has it all

OnePlus Nord 6 Review: The new endurance king that almost has it all

HyperX Pulsefire Saga Review: The mouse that lets you be the designer

HyperX Pulsefire Saga Review: The mouse that lets you be the designer

Samsung Galaxy A57 & A37 Review: Safe Upgrades or Missed Opportunity?

Samsung Galaxy A57 & A37 Review: Safe Upgrades or Missed Opportunity?

Samsung Galaxy Buds4 Pro Review: Flagship Sound Meets Elite ANC

Samsung Galaxy Buds4 Pro Review: Flagship Sound Meets Elite ANC

Realme 16 5G Review: Endurance Meets Everyday Use

Realme 16 5G Review: Endurance Meets Everyday Use

ADVERTISEMENT

editorji-whatsApp

More videos

Vivo V70 FE Review: Style Meets Serious Battery Power

Vivo V70 FE Review: Style Meets Serious Battery Power

OnePlus Nord 6 First Look: Specifications, Features, and What to Expect

OnePlus Nord 6 First Look: Specifications, Features, and What to Expect

Samsung Galaxy S26 & S26+ Review: Exynos is Back, And It Means Business

Samsung Galaxy S26 & S26+ Review: Exynos is Back, And It Means Business

OnePlus Nord Buds 4 Pro Review: Better in All the Right Ways? feat. Nord Buds 3 Pro

OnePlus Nord Buds 4 Pro Review: Better in All the Right Ways? feat. Nord Buds 3 Pro

Poco X8 Pro Max Review: Big Battery, Bigger Ambitions

Poco X8 Pro Max Review: Big Battery, Bigger Ambitions

iQOO Z11x 5G Review: The best budget phone under 20K?

iQOO Z11x 5G Review: The best budget phone under 20K?

Nothing Phone (4a) Pro Review: This One Finally Feels Complete

Nothing Phone (4a) Pro Review: This One Finally Feels Complete

Samsung Galaxy S26 Ultra Review: Pros, Cons & Real-World Test

Samsung Galaxy S26 Ultra Review: Pros, Cons & Real-World Test

Xiaomi 17 Review: Is This the Best Compact Flagship of 2026?

Xiaomi 17 Review: Is This the Best Compact Flagship of 2026?

Xiaomi Pad 8 Review: The Smart Value King Returns

Xiaomi Pad 8 Review: The Smart Value King Returns

Editorji Technologies Pvt. Ltd. © 2022 All Rights Reserved.