Highlights

  • Hackers easily connect with new users
  • Send malicious files for download via messages
  • Stealer malware gets installed in the victim's computer

Latest news

Samsung Galaxy M17 5G Review: Best Budget Samsung Phone Under ₹15,000?

Samsung Galaxy M17 5G Review: Best Budget Samsung Phone Under ₹15,000?

OnePlus 15R first look: OnePlus changes the R-series playbook

OnePlus 15R first look: OnePlus changes the R-series playbook

India's retail inflation rises to 0.71% in November

India's retail inflation rises to 0.71% in November

Cabinet approves CoalSETU window for auction of coal to boost industrial use and export

Cabinet approves CoalSETU window for auction of coal to boost industrial use and export

Cabinet approves Minimum Support Price for Copra for 2026 season

Cabinet approves Minimum Support Price for Copra for 2026 season

Fire never left: Vinesh Phogat comes out of retirement, targets LA Olympics

Fire never left: Vinesh Phogat comes out of retirement, targets LA Olympics

Flexible office segment in India set to grow faster, over 25% annually by 2027: Report

Flexible office segment in India set to grow faster, over 25% annually by 2027: Report

Rahul Gandhi flags issue of air pollution, seeks discussion in Lok Sabha

Rahul Gandhi flags issue of air pollution, seeks discussion in Lok Sabha

Hackers are using LinkedIn to steal user data

Since many LinkedIn users accept new connections without verifying them, hackers are able to connect with new people and send them malicious files. 

Hackers are using LinkedIn to steal user data

New research has revealed that hackers are using Microsoft's LinkedIn to propagate data-stealing malware by making connection requests in the guise of employees of reputable firms.

Researchers from the AI cyber-security firm CloudSEK discovered that scammers are using LinkedIn's chat and job posting functions to distribute links/files containing stealer malware.

Since the majority of LinkedIn users accept all connection requests, fraudsters may simply make relationships and establish their reputation on the network.

After establishing their trustworthiness, hackers distribute infected files and links, which are subsequently opened by victims who are unaware of the danger.

Once opened, stealer malware is placed on the victim's PC, stealing passwords, credit card details, and other sensitive data before sending it to the threat actors.

The compromised social media and email accounts of the victim are then taken over with the stolen credentials.

It is recommended that all users verify connection requests before to accepting them, even if the requestor is linked to someone you know.

Before accessing documents and files exchanged on LinkedIn, it is equally important to screen them for malware.

Also watch: Samsung Galaxy Z Fold4 Review

ADVERTISEMENT

Up Next

Hackers are using LinkedIn to steal user data

Hackers are using LinkedIn to steal user data

OnePlus 15R first look: OnePlus changes the R-series playbook

OnePlus 15R first look: OnePlus changes the R-series playbook

OnePlus Pad Go 2 First Look: Larger display, more polish, but does it work?

OnePlus Pad Go 2 First Look: Larger display, more polish, but does it work?

Realme Watch 5 Review: A budget smartwatch that gets the basics right

Realme Watch 5 Review: A budget smartwatch that gets the basics right

Realme P4x Review: Budget performer with a beast of a battery

Realme P4x Review: Budget performer with a beast of a battery

Nothing Phone 3a Community Edition ASMR Unboxing & First Look: For the fans, by the fans

Nothing Phone 3a Community Edition ASMR Unboxing & First Look: For the fans, by the fans

ADVERTISEMENT

editorji-whatsApp

More videos

Comic Con Delhi 2025: Sony PlayStation Leads the Floor

Comic Con Delhi 2025: Sony PlayStation Leads the Floor

OnePlus marks 12 years in India with a new six-star lineup for the 15R reveal

OnePlus marks 12 years in India with a new six-star lineup for the 15R reveal

Vivo X300 Pro Review: Pro-grade cameras, fantastic performance, but is it truly unbeatable?

Vivo X300 Pro Review: Pro-grade cameras, fantastic performance, but is it truly unbeatable?

Realme Watch 5 First Look: Inside the factory where It’s Made in India

Realme Watch 5 First Look: Inside the factory where It’s Made in India

Vivo X300 Review: Compact flagship, powerful performance, but what about the cameras?

Vivo X300 Review: Compact flagship, powerful performance, but what about the cameras?

Nothing Phone 3a Lite Review: Easy to like, but is it good value for money?

Nothing Phone 3a Lite Review: Easy to like, but is it good value for money?

iQOO 15 Review: A premium leap that finally puts iQOO in the top tier

iQOO 15 Review: A premium leap that finally puts iQOO in the top tier

Realme GT 8 Pro Dream Edition: Premium or Just Racing Paint? Full Review  

Realme GT 8 Pro Dream Edition: Premium or Just Racing Paint? Full Review  

Blaupunkt 65-inch Google Mini QD TV Review: The Surprise Package of 2025?

Blaupunkt 65-inch Google Mini QD TV Review: The Surprise Package of 2025?

Oppo Find X9 Pro Review: Massive Battery, Pro Cameras, Big Price — Worth It?

Oppo Find X9 Pro Review: Massive Battery, Pro Cameras, Big Price — Worth It?

Editorji Technologies Pvt. Ltd. © 2022 All Rights Reserved.