ALL >> Technology,-Gadget-and-Science >> View Article
Linkedin Users Get A 'profile Makeover' They Never Asked For – Thanks To Hackers!

LinkedIn, a trailblazer in revolutionizing professional networking, faces a current crisis as cyberattacks surge, targeting vulnerabilities and compromising user accounts. The alarming report reveals a distressing trend: hackers exploiting weaknesses within LinkedIn's framework to take over accounts. The situation has escalated to an extent where victims are coerced into paying ransoms to regain control, lest their accounts be irrevocably deleted.
Despite the lack of an official statement from LinkedIn, the impact of these attacks reverberates globally. Online discourse and search queries underscore a troubling surge in compromised LinkedIn accounts. Coral Tayar, a cybersecurity expert, notes an exponential increase in searches for hacked accounts, signaling a staggering growth rate exceeding 5,000%. These attacks involve attempts to breach accounts through two-factor authentication or brute-force password methods.
The attacks unfold in two discernible scenarios. In the first, LinkedIn proactively identifies and locks accounts displaying anomalous behavior. Users receive notifications prompting them to verify their ...
... accounts and update passwords. However, frustration simmers among those affected, who lambast the platform's security measures on social media. The second, graver scenario witnesses attackers successfully infiltrating accounts and changing associated email addresses, often redirecting to rambler.ru domains, leaving victims stranded without recourse.
https://www.techdogs.com/tech-news/td-newsdesk/linkedin-users-get-a-profile-makeover-they-never-asked-for-thanks-to-hackers
This isn't the first time LinkedIn has encountered cyber threats. Its widespread popularity within the corporate realm has attracted malicious attention, resulting in its unfortunate distinction as the most exploited brand in phishing attempts in 2023. Noteworthy is the employment of counterfeit LinkedIn profiles by the North Korean Lazarus group for phishing campaigns targeting security experts. Furthermore, LinkedIn figured in a spear-phishing endeavor targeting Facebook Business accounts for malvertising activities.
Given these threats, LinkedIn users are advised to bolster their internet security settings, exercise caution regarding unsolicited messages, and promptly report any unusual account behavior. Amid escalating concerns, users eagerly anticipate LinkedIn's official response and concerted actions to fortify the protection of their digital identities on the platform. This wave of cyberattacks serves as a stark reminder that, even in the realm of virtual professional networking, security remains a critical and evolving challenge.
Add Comment
Technology, Gadget and Science Articles
1. Enhancing Worker Safety In Manufacturing With Ar/vr TrainingAuthor: Akas
2. What Are The Hidden Benefits Of Silent Pods And Booths In Home Offices?
Author: Silent Pod
3. The Benefits Of Renting Silent Pods For Events And Temporary Needs!
Author: Silent Pod
4. How Metal 3d Printing Is Transforming Prototyping In India [updated 2025]
Author: Protomont technologies
5. How To Fix Pla Filament Getting Brittle: Essential Tips For 3d Printing Success
Author: Protomont technologies
6. How Can A Virtual Receptionist Help You?
Author: Eliza Garran
7. How Ask On Data Helps Businesses Tackle Complex Data Wrangling Challenges
Author: Vhelical
8. How Conversational Ai Is Transforming Business Communication And Efficiency
Author: Prarthana
9. Cybersecurity In 2025: Ai-powered Threats, Supply Chain Vulnerabilities, And Regulatory Pressures Take Center Stage
Author: Santhosh Jochim
10. Artificial Intelligence In The Future World
Author: SEO HUNTER
11. Integrating Nfc Readers Into Mobile Devices: Benefits And Challenges
Author: Sankalp Singh
12. What Is Vapt Penetration Test?
Author: Qualysec Technologies
13. Improve Delivery Speed By Web Scraping Quick Commerce Data
Author: Devil Brown
14. What Is Betfury Clone Script And How It Can Revolutionize Your Crypto Gambling Platform
Author: judemaxwell
15. What Are The Benefits Of Application Integration?
Author: goodcoders