Please be aware the traps and pitfalls of using LinkedIn if you are one of the users of LinkedIn. As everyone knows that LinkedIn is the most popular professional business-focused social network which is now owned by Microsoft. Just a few days ago, LinkedIn used its official blog to announce that it has now over 500 million registered users in 200 countries on this social platform. As one of Internet users’ top choices for professional communication and finding career opportunities, all of us need to be aware of the risks of phishing scam happening on LinkedIn.
Some malicious links are detected as safe when scanned through inadequate antivirus software, so the suspicious activity on your system might not be picked up by your antivirus program. To block the threats from accessing your computer and keep your personal data safe from malware, we highly recommend that you install the antivirus software with efficient real-time protection:
Beware: Email Phishing Scam Targets LinkedIn Users
Cyber criminals are targeting at LinkedIn users with a sophisticated email phishing scam for tricking users. Basically the ultimate objective of LinkedIn scam is users’ personal information. Users of LinkedIn are easy meat for cyber criminals due to its advantages that are also its drawbacks – anyone can create a profile and build connection with others easily. Unlike other popular social networking sites designed for personal life, most users come to LinkedIn with the motive of looking for the chance of getting hired and business deals, which means that they are open to new opportunities so they have to accept the invitation from someone that they don’t know in private life. Typically, the trap is set up when a user receives a phishing email disguised as a real email from LinkedIn. In the message, the scammers may tell the recipient that a company is “urgently seeking for immediate employment” in their region. They urge the victim to upload the CV quickly to in case he or she would miss the precious offer.
If you are eager to get hired then you likely do not notice that the email is bogus. Once the scammer receives your CV, your personal privacy could be sold or the information could be crafted for a spear-phishing campaign to target current and former employers/colleagues.
Here below are tips about how to spot a LinkedIn scam:
- Do not come from a real LinkedIn email address;
- Do not address recipients by name – and do not describe what region the employer is recruiting in, or specify which of qualifications they believe have been matched with the potential employer’s criteria;
- The message is not written in formal English. In many of the fake LinkedIn profiles, there are some clear presentation errors.
Aside from creating a sense of urgency, there’s plenty of factors that give this email away as a fake. The email should originate from “LinkedIn” at a legitimate “@linkedin.com” email address. Instead, it comes from “linkedin messages” at the email address info@serv1[dot]cyber-net[dot]bid. (The top-level domain “.bid” mostly designates websites hosting online auctions.) The email also doesn’t properly incorporate other design elements like a footer or connection suggestions that are found in actual LinkedIn emails.
What You Should Do If You Are Involved in LinkedIn Phishing Email Scam
The fake alarming pop-ups appear on the screen are often caused by the malware/Trojan/virus that hide in your system without being noticed. Many users may not know that fake warnings can be distributed during installation of some freeware. For example, a malicious browser extension is usually added when you install other free software. When you are browsing and landing on insecure websites, a simple click on advertisements or suspicious links can also serve for the distribution of LinkedIn scams.
To remove the malware brought by the scam or annoying pop-ups from your PC, please follow the step-by-step removal instructions given below.
If you are talking with the scammer over the phone, you should just simply hang up and do not give out your personal details.
Once you already gave the scammers access to your computer, disconnect your machine from network immediately to kick the crook out from your system.
Next, you should clean the infected computer by removing the malware from the system.
For Users of Windows 7:
1. Click on the Start icon and then select Control Panel.
2. Click on Uninstall a program when you view Control Panel items by Category.
3. In Programs and Features, locate the recently-installed suspicious programs from the list and click on Uninstall.
4. Restart your PC.
5. Reset your browser:
Open Firefox browser.
Click the Menu button at the top right to access Help menu.
From the there, choose Troubleshooting Information.
Click the Refresh Firefox button in the upper-right corner of the Troubleshooting Information page.
To continue, click Refresh Firefox in the confirmation window that opens.
Firefox will close to refresh itself. When finished, a window will list your imported information.
Click Finish and Firefox will open.
Open IE browser.
Click on the Tools button and then select Internet options.
In the Advanced tab select Reset.
Close all other applications before starting resetting the browser or your will receive a message like this:
In the Reset Internet Explorer Settings dialog box, select Reset.
Restart your browser to apply changes.
Open Chrome browser. At the top right, click More Settings button.
Select Settings from the list.
At the bottom of the page, click Show advanced settings.
Under the section “Reset settings“, click Reset settings button.
In the box that appears, click Reset.
Restart the browser at the end.
6. Scan your computer with reliable anti-malware program
Download the free scanner SpyHunter on your PC.
SpyHunter is a powerful anti-malware program which can help prevent and remove most of newly-released malware and virus. It has been tested clean of viruses and malware so is 100% safe to use. It won’t take up too much space on your disk so you don’t need to worry about installing extra security program would slow down your computer speed.
Install it on your computer by following the prompts.
There is no any additional program contained within the installer, but you are still suggested to read the introduction about this software and learn more about it.
Click on Finish and close the installer. The whole process will be complete in about 1 minute.
Once installed, SpyHunter will automatically start and initiate a quick scan on your PC.
When the scan is complete, you will be presented with a long list showing you the computer threats that it has detected.
To remove these threats, click on the Fix Threats.
Note: The free edition of SpyHunter provides free scan for PC infection. The other benefits including fixes to specific spyware problems, personal technical support, removal of rootkits and malware are available to registered users.
- Click Go → Applications.
- Find all questionable programs, right-click on them and move them to Trash.
Once done, reset Safari’s settings. For this purpose, do the following:
- Launch Safari, and then find and click Safari in the menu bar at the top of the screen. Then go to Preferences.
- Go to Extensions tab and look for suspicious entries. Uninstall each of them.
- Then go to General tab and check what URL is entered into Homepage box. If you see a suspicious link, remove it and replace it with a website that you want to set as a homepage. Remember that you must type in http:// before entering a preferred URL.
- Reset Safari. Click Safari, and click on Reset Safari… option.
- When Reset Safari pop-up appears, check all checkboxes and click Reset.
Tips on How to Remain Safe and Avoid LinkedIn Scams:
This is not the first time when LinkedIn users have been targeted with such scam. In the past, the users have been under target by spyware, Trojan developed to steal login credentials of job seekers and phishing sites that records users’ input data. Please remember not to click on links in strange emails, and make sure to verify sender addresses in incoming messages to ensure you don’t wind up giving away your login information to scammers. The right thing to do is learn about the most frequent online scams that you could come across on the Internet, and be cautious about variations and new tactics that lure you into divulging private data or installing malware on your devices.
Most malware messes around with important files that halt your computer running properly. If you are unsure whether the program you downloaded is malware or a legitimate program, use cutting-edge technology equipped with our antivirus software to detect all types of malicious software on your computer. It is able to find viruses, spyware, rootkits and Trojans if your system is affected.