Contents:
In a sweeping global campaign, LinkedIn users are falling victim to a surge of account hijacks, leaving many locked out or held at ransom by threat actors.
Rampant Account Hijacking and Extortion
LinkedIn, the professional networking platform, is facing a surge of account breaches, with hackers resorting to both brute-force attacks and leaked credentials to gain unauthorized access.
The aftermath leaves some users temporarily locked out, necessitating identity verification and password updates for restoration. However, the situation worsens for others, as attackers take complete control of accounts and swiftly alter associated email addresses, rendering victims helpless in their attempts to regain control.
The attackers capitalize on the compromised accounts by threatening victims with permanent deletion. In some cases, users have been coerced into paying ransoms to reclaim their hijacked accounts.
Widespread Impact
The magnitude of the campaign is highlighted by the staggering surge in search queries related to “LinkedIn account hacked” and “LinkedIn account recovery,” which has spiked by an astonishing 5000%, according to Google Trends data. Researchers believe that the alarming number of complaints indicates a meticulously planned and targeted effort by cybercriminals.
While the motives behind the attacks remain somewhat unclear, experts warn of the far-reaching consequences. Stolen professional accounts can serve as a goldmine for threat actors engaging in social engineering, blackmail, and data gathering.
Safeguarding Your Account – Heimdal®`s Advice
Given the potential risks and ramifications, LinkedIn users are advised to take immediate action to fortify their accounts.
Our experts recommend regular checks for any changes to the primary email address, rigorous password security, and the activation of two-factor authentication (2FA).
By bolstering these simple yet crucial security measures, you can significantly reduce vulnerability to account breaches and protect your personal and professional data from falling into the wrong hands.
If you liked this article, follow us on LinkedIn, Twitter, Facebook, and YouTube for more cybersecurity news and topics.