Unit 42 and others describe phishing and social engineering campaigns that use scraped LinkedIn data and fake job interview workflows to steal credentials or solicit payments. The recurring pattern is account takeover via professional-network trust.
We identified a phishing campaign targeting senior professionals by impersonating Palo Alto Networks staff.
Threat actors leverage scraped LinkedIn data to claim resumes failed system filters then solicit fees for alignment.
Watch out as a new LinkedIn phishing scam uses fake notifications and lookalike domains to steal credentials, hijack accounts
North Korea Tried to Hack Our CEO Through a Fake Job Interview on LinkedIn
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security