The e-mails warn potential victims of “irregular activities” on their account and say a compulsory security update is required. The e-mails include an html attachment that purports to be a form for performing the update.
The html file is actually a copy of LinkedIn’s website and login page. But the website code in the file has been modified, so if a user logs in, their account credentials are sent to the attackers.
Users are guided to enable two-step verification on their account. If that’s enabled, LinkedIn sends a one-time passcode over SMS that is required to complete logging into an account. Even if the attackers gain a person’s login credentials, they could not take over an account.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now
We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the The Paypers website, they in no way represent the opinion of The Paypers.