After Le Bon Coin, hackers and spies rage on LinkedIn


The professional network of Microsoft LinkedIn, with 850 million subscribers worldwide in 2022, is weakened by the attack of hackers and spies. An employee of a large French tech company testifies, in an investigation by the Figaro, of the piracy of which he was the victim. Contacted by an executive of a Chinese company, and after having passed a telephone interview, he receives a PDF with what appears to be a job description. Behind it, in reality, hides software aimed at hacking into the professional computer of the young employee. If the leak has been brought under control, it is impossible for anyone to trace the trail since the Chinese account was deleted the next day.

Headhunters, consultants, executives… The fake accounts that abound on the site bear different labels. It is therefore difficult to determine a pattern to be wary of. By constituting a false CV and false relationships, by abusing the security aspect that emerges from the professional environment of the social network, hackers manage to deceive the trust of many users. These fake accounts then seek different objectives depending on the target they covet. From simple hacking or commercial prospecting, the steps can go as far as economic espionage and the subtraction of information.

Enhanced security

A multiplication of the dangers which then push LinkedIn to redouble its vigilance and to work twice as hard on the security of the site. Contacted by Le Figarothe network claims to put “makes every effort to ensure that the people and content that members interact with on LinkedIn are real and reliable”. A spokesperson even wants to be reassuring: “Around 96% of fake profiles and 99.1% of detected spam and fraud are removed.

Despite these reassuring figures, this does not prevent LinkedIn from implementing new security measures. Like Twitter, for example, profiles will soon display the account creation date. The professional social network is also working on domain verification with authenticity checking that the email used corresponds to the company declared on the profile.

Advertising, your content continues below



Source link -98