Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

What You Need to Know About the New LinkedIn Phishing Scheme

By Jordyn Alger, Managing Editor
LinkedIn icon on phone
Aidin Geranrekab via Unsplash
January 15, 2026

Reports of a new LinkedIn phishing scam have emerged, stating that malicious actors are leaving comments on posts posing as the platform LinkedIn itself. These comments assert that the target’s account has been restricted due to policy violations and prompts them to click a link in order to submit an appeal. The scam comments are reportedly convincing, looking almost identical to legitimate comments from the platform.

“This phishing campaign illustrates how social engineering is evolving to blend seamlessly into trusted platforms,” says Shane Barney, Chief Information Security Officer at Keeper Security. “By posting fake policy violation notices directly in LinkedIn comment threads, attackers exploit users’ expectations about how platform moderation works. The use of LinkedIn-style language, impersonated company pages and even lnkd.in short links makes these messages appear legitimate at a glance.” 

Involvement of AI

Artificial intelligence (AI) could be a key component of the scheme’s effectiveness. 

“Although LinkedIn’s process for creating a company page, especially one that appears to be LinkedIn itself, was not previously easy to abuse at scale, the proper application of AI now makes it possible,” says Max Gannon, Cyber Intelligence Team Manager at Cofense. “When integrated with the contact methods used in this campaign, it could allow threat actors to quickly deploy large scale campaigns that spoof LinkedIn and abuse legitimate infrastructure.” 

Once the link is clicked, users are directed to a fraudulent, convincing verification page that harvests credentials. 

“What makes this especially effective is scale, AI-driven automation allows threat actors to flood comment sections faster than manual moderation can respond,” says Kern Smith, Senior Vice President of Global Solutions Engineering at Zimperium. 

This scheme shows that as AI accelerates and elevates phishing schemes and other cyber threats, organizations will need to evolve alongside them to stay secure. 

“As threat actors increasingly use AI and emerging automated methods, legitimate companies like LinkedIn will need stronger verification and validation controls to prevent abuse of their services and protect brand trust,” says Gannon. 

Widespread Implications

This phishing scam could hold greater implications than a singular, contained issue limited to LinkedIn’s platform. 

Chance Caldwell, Senior Director of the Phishing Defense Center at Cofense, explains, “This new LinkedIn phishing campaign highlights a troubling evolution in social engineering tactics, where attackers embed themselves directly into trusted digital spaces and exploit user trust by mimicking legitimate communications. By posting comments that appear to come from LinkedIn complete with official branding and even legitimate URL shorteners like lnkd.in, the threat actors are able to earn trust from users and divert them to malicious phishing activity.” 

Although this scheme targets LinkedIn, other platforms are not exempt from similar threats. Last year, YouTube faced a sophisticated phishing campaign in which Neal Mohan, CEO of YouTube, was replicated by a deepfake impersonation to target content creators with credential stealing schemes or malware installations. 

Caldwell notes, “This activity is not unique to LinkedIn and we will continue to see it across all social media platforms with the rise of AI allowing thousands of these fake comments able to be posted in a small amount of time. Facebook in particular is being used often to redirect users to phishing webpages. It will be up to the Social Media giants to continue advancing their comment/post monitoring to capture and remove as many of these malicious posts within a short amount of time before users interact with them. Individuals will also need to be aware of these tactics and only interact with posts that they can verify as legitimate.” 

What Risks Do Campaigns Like This Present? 

“The true danger of phishing schemes like this lies in their ability to grant attackers access to credentials, enabling them to masquerade as trusted insiders,” says Rex Booth, Chief Information Security Officer at SailPoint. “We’ve been waiting for this offensive disruption from AI for a while now. Attacks like this at scale and superhuman speed are the most obvious first step. Fortunately, this campaign still requires human intervention to execute. The scarier scenario is when adversary AI starts running rampant through your enterprise without the need for action by the victim.” 

The loss of an individual’s credentials isn’t the only thing at stake, in campaigns like these. In some instances, malicious actors can leverage their access to explore systems and expand influence. 

Booth explains, “Adversaries often begin by compromising low-privileged accounts, using them as a foothold to quietly observe systems, map out processes, and identify vulnerabilities. Over time, they escalate privileges or move laterally, positioning themselves to impersonate legitimate users, authorize fraudulent transactions, or disrupt operations. The real damage isn’t just in the initial breach. It’s in the silent, calculated exploitation of compromised identities that can go undetected for weeks or even months. Organizations must act now to close these gaps before attackers exploit them.” 

The Evolution of Phishing 

Phishing has been a go-to technique for malicious actors in recent years and is consistently evolving, with fresh tactics often emerging — such as QR code phishing (quishing). 

Additionally, social media has become an easy gateway for cybercriminals to exploit, whether by spoofing popular social platforms or leveraging memes for malicious activity. 

The recent LinkedIn campaign is yet another example of the advancement and sophistication modern phishing threats present, serving as a reminder that cyber threats never stay stagnant. 

“This campaign shows how phishing has evolved beyond email and into trusted social platforms,” Smith concludes. 

KEYWORDS: phishing campaigns social media social media risk threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Rendered heart monitors

Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs

Smiling officer

What Can Security Leaders Learn From Prevented University Attack?

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Plasma ball

    DeepSeek: What to know about the Chinese artificial intelligence model

    See More
  • Security officers walking school perimeter

    K-12 vs. Higher Education Security: What Schools and Colleges Need to Know

    See More
  • SEC0919-Edu2-Feat-slide1_900px

    What Do You Need to Know About the California Consumer Privacy Act?

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing