Account Takeover And CredentialsIncident

LinkedIn phishing and fake job interview lures targeting executives

March 31, 2026Unit 42, Hackread.com, Chuck Brooks

Unit 42 and others describe phishing and social engineering campaigns that use scraped LinkedIn data and fake job interview workflows to steal credentials or solicit payments. The recurring pattern is account takeover via professional-network trust.

We identified a phishing campaign targeting senior professionals by impersonating Palo Alto Networks staff.
Threat actors leverage scraped LinkedIn data to claim resumes failed system filters then solicit fees for alignment.
Watch out as a new LinkedIn phishing scam uses fake notifications and lookalike domains to steal credentials, hijack accounts
North Korea Tried to Hack Our CEO Through a Fake Job Interview on LinkedIn
Unit 42
Hackread.com
Chuck Brooks
Nicolas Krassas
phishingsocial engineeringaccount takeoverlinkedinsocial engineering

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security