123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Linkedin Users Get A 'profile Makeover' They Never Asked For – Thanks To Hackers!

Profile Picture
By Author: joy
Total Articles: 177
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

LinkedIn, a trailblazer in revolutionizing professional networking, faces a current crisis as cyberattacks surge, targeting vulnerabilities and compromising user accounts. The alarming report reveals a distressing trend: hackers exploiting weaknesses within LinkedIn's framework to take over accounts. The situation has escalated to an extent where victims are coerced into paying ransoms to regain control, lest their accounts be irrevocably deleted.

Despite the lack of an official statement from LinkedIn, the impact of these attacks reverberates globally. Online discourse and search queries underscore a troubling surge in compromised LinkedIn accounts. Coral Tayar, a cybersecurity expert, notes an exponential increase in searches for hacked accounts, signaling a staggering growth rate exceeding 5,000%. These attacks involve attempts to breach accounts through two-factor authentication or brute-force password methods.

The attacks unfold in two discernible scenarios. In the first, LinkedIn proactively identifies and locks accounts displaying anomalous behavior. Users receive notifications prompting them to verify their ...
... accounts and update passwords. However, frustration simmers among those affected, who lambast the platform's security measures on social media. The second, graver scenario witnesses attackers successfully infiltrating accounts and changing associated email addresses, often redirecting to rambler.ru domains, leaving victims stranded without recourse.

https://www.techdogs.com/tech-news/td-newsdesk/linkedin-users-get-a-profile-makeover-they-never-asked-for-thanks-to-hackers

This isn't the first time LinkedIn has encountered cyber threats. Its widespread popularity within the corporate realm has attracted malicious attention, resulting in its unfortunate distinction as the most exploited brand in phishing attempts in 2023. Noteworthy is the employment of counterfeit LinkedIn profiles by the North Korean Lazarus group for phishing campaigns targeting security experts. Furthermore, LinkedIn figured in a spear-phishing endeavor targeting Facebook Business accounts for malvertising activities.

Given these threats, LinkedIn users are advised to bolster their internet security settings, exercise caution regarding unsolicited messages, and promptly report any unusual account behavior. Amid escalating concerns, users eagerly anticipate LinkedIn's official response and concerted actions to fortify the protection of their digital identities on the platform. This wave of cyberattacks serves as a stark reminder that, even in the realm of virtual professional networking, security remains a critical and evolving challenge.

Total Views: 136Word Count: 333See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Enhancing Worker Safety In Manufacturing With Ar/vr Training
Author: Akas

2. What Are The Hidden Benefits Of Silent Pods And Booths In Home Offices?
Author: Silent Pod

3. The Benefits Of Renting Silent Pods For Events And Temporary Needs!
Author: Silent Pod

4. How Metal 3d Printing Is Transforming Prototyping In India [updated 2025]
Author: Protomont technologies

5. How To Fix Pla Filament Getting Brittle: Essential Tips For 3d Printing Success
Author: Protomont technologies

6. How Can A Virtual Receptionist Help You?
Author: Eliza Garran

7. How Ask On Data Helps Businesses Tackle Complex Data Wrangling Challenges
Author: Vhelical

8. How Conversational Ai Is Transforming Business Communication And Efficiency
Author: Prarthana

9. Cybersecurity In 2025: Ai-powered Threats, Supply Chain Vulnerabilities, And Regulatory Pressures Take Center Stage
Author: Santhosh Jochim

10. Artificial Intelligence In The Future World
Author: SEO HUNTER

11. Integrating Nfc Readers Into Mobile Devices: Benefits And Challenges
Author: Sankalp Singh

12. What Is Vapt Penetration Test?
Author: Qualysec Technologies

13. Improve Delivery Speed By Web Scraping Quick Commerce Data
Author: Devil Brown

14. What Is Betfury Clone Script And How It Can Revolutionize Your Crypto Gambling Platform
Author: judemaxwell

15. What Are The Benefits Of Application Integration?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: