IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

MI5 warns of foreign agents using LinkedIn to steal information

Some UK government departments are thought to have engaged with fake profiles linked to hostile states

A collection of digital profiles

More than 10,000 British nationals have been approached by fake LinkedIn profiles that are associated with hostile states, according to MI5. 

The UK's security organisation believes that any users that accepted such a request might have been tricked into sharing secrets. 

A campaign has been launched by the Centre for the Protection of National Infrastructure (CPNI) called Think Before You Link, which warns that foreign agents are targeting officials with access to sensitive information. The project shares concerns that once a request has been accepted, the victim's colleagues will be more likely to accept a follow-up request as it looks like they share a mutual acquaintance

Nearly all government departments and some key industries are thought to have been targeted by fake LinkedIn accounts. A large number of those approached might have engaged with the profiles that contacted them, which may have offered speaking or business and travel opportunities as ways to extract confidential information.

LinkedIn said it "welcomed" the efforts of the CPNI and its Think Before You Link campaign.

Related Resource

The definitive guide to IT security

Protecting your MSP and your customers

The definitive guide to IT security for MSPs - whitepaper from LiongardDownload now

"We actively seek out signs of state-sponsored activity on the platform and quickly take action against bad actors in order to protect our members," the company said in a statement. "Our Threat Intelligence team removes fake accounts using information we uncover and intelligence from a variety of sources, including government agencies." 

While the number of profiles targeting UK officials is alarming, cyber attacks are almost always less sophisticated than people imagine, according to Idax CEO Mark Rodbert. 

"Technology is the most common vector, rather than the method, and cyber vulnerability often has more to do with mind-reading acts than complex technological tools," Rodbert told IT Pro.

"Cyber criminals and foreign agents draw heavily from the confidence tricksters of the past, so their methods are often quite straightforward. If you ask someone for their data, you would be surprised at how often they tell you. People make mistakes"

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Education and government most at risk from email threats
phishing

Education and government most at risk from email threats

26 Nov 2021
Attackers use CSS to fool anti-phishing systems
phishing

Attackers use CSS to fool anti-phishing systems

11 Nov 2021
X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

26 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022