Summary
- LinkedIn users are being targeted by a campaign that steals their accounts and then demands a ransom to avoid having the accounts deleted.
- The attackers may be using a variety of methods to gain access to accounts, including brute force attacks and credential stuffing.
- Victims are usually made aware of the attack when they receive a notification that the email address associated with their account has been changed.
- In some cases, the attackers have also added fake accounts to the victim’s connections.
- LinkedIn support has not been helpful in recovering the breached accounts, with users reporting long wait times and unhelpful responses.
- The best way to protect yourself from this attack is to set up two-step verification (2FA).
More Details
- 2FA adds an extra layer of security to your account by requiring you to enter a code from your phone in addition to your password when you sign in.
At least 2 Ways to set up 2FA on LinkedIn
- Authenticator app 2FA: This method uses an app on your phone to generate a code. Authenticator app 2FA is considered to be more secure than SMS 2FA.
- SMS 2FA: This method sends a code to your phone via SMS.
If I had a LinkedIn account, they could have at it. LinkedIn is capitalist pr0n.
Nothing but corporate dicksucking
That’s truly all it is! There is nothing of value that can be learned on LinkedIn. It’s bootlickers dry humping the wealthy.