Watch out – that LinkedIn email could be a fake, laden with malware


- Security researchers find phishing emails spoofing LinkedIn notifications
- The emails are distributing the ConnectWise Remote Access Trojan
- There are multiple red flags, including fake companies, fake images, and more
Cybercriminals are spoofing LinkedIn notification emails to deliver the ConnectWise Remote Access Trojan (RAT) malware, experts have warned.
A new report from cybersecurity researchers Cofense Intelligence notes the phishing campaign likely started in May 2024 with an email mimicking a notification LinkedIn would send to a person when they receive an InMail message. The business platform does not allow people who are not connected to exchange messages, unless the sender is a Premium (paying) member. Then, they can use a service called InMail to reach out to people with whom they are not connected.
Receiving such a message would trigger an email notification from LinkedIn, which is what the attackers are spoofing here.
You may like
Bypassing email filters
There are multiple red flags in the email. First, the template used has been phased out by LinkedIn almost five years ago. Then, the supposed project manager/sales director sending the message does not exist, and the attached photo is labeled “executive16.png”. The profile picture used in the email belongs to the President of the Korean Society of Civil Engineering Law, a person called Cho So-young.
Finally, the company for whom the sender allegedly works is called “DONGJIN Weidmüller Korea Ind” and it, too, does not exist.
The email comes with one of two buttons: “Read More” and “Reply To”. Both trigger the download of ConnectWise, a remote administration tool that was originally part of ConnectWise ScreenConnect, a legitimate remote desktop software used for IT support and management. However, cybercriminals have hijacked it and abuse it as a Remote Access Trojan (RAT) to gain unauthorized control over systems.
The email made it past security filters primarily because of how email authentication settings were configured on the recipient’s system, the researchers added.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Even though the email failed SPF (Sender Policy Framework) and wasn’t signed with DKIM (DomainKeys Identified Mail), it still wasn’t outright rejected by the system. This happened because the email security policy, specifically DMARC (Domain-based Message Authentication, Reporting, and Conformance), was set to “oreject” instead of fully rejecting suspicious emails.
This setting likely allowed the email to be marked as spam but still land in the recipient’s inbox.
You might also like
Security researchers find phishing emails spoofing LinkedIn notifications The emails are distributing the ConnectWise Remote Access Trojan There are multiple red flags, including fake companies, fake images, and more Cybercriminals are spoofing LinkedIn notification emails to deliver the ConnectWise Remote Access Trojan (RAT) malware, experts have warned. A new report…
Recent Posts
- The best Prime Day 2025 deals you can still get
- New Asus Pro laptops look a lot like Apple’s Space Black MacBook Pro, and pair an AMD Ryzen 9 AI CPU with an RTX 5070
- The best fitness tracker and smartwatch Prime Day deals
- 13 Best Amazon Prime Day Vacuum Deals for Dust and Dirt in 2025
- Arm’s legendary rival was in the original PlayStation; now, in a twist of fate, MIPS has been sold to AMD’s former foundry
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022