MI5 warns of foreign agents using LinkedIn to steal information

Some UK government departments are thought to have engaged with fake profiles linked to hostile states

A collection of digital profiles

More than 10,000 British nationals have been approached by fake LinkedIn profiles that are associated with hostile states, according to MI5. 

The UK's security organisation believes that any users that accepted such a request might have been tricked into sharing secrets. 

A campaign has been launched by the Centre for the Protection of National Infrastructure (CPNI) called Think Before You Link, which warns that foreign agents are targeting officials with access to sensitive information. The project shares concerns that once a request has been accepted, the victim's colleagues will be more likely to accept a follow-up request as it looks like they share a mutual acquaintance Nearly all government departments and some key industries are thought to have been targeted by fake LinkedIn accounts. A large number of those approached might have engaged with the profiles that contacted them, which may have offered speaking or business and travel opportunities as ways to extract confidential information. LinkedIn said it "welcomed" the efforts of the CPNI and its Think Before You Link campaign.

Related Resource

The definitive guide to IT security

Protecting your MSP and your customers

The definitive guide to IT security for MSPs - whitepaper from LiongardDownload now

"We actively seek out signs of state-sponsored activity on the platform and quickly take action against bad actors in order to protect our members," the company said in a statement. "Our Threat Intelligence team removes fake accounts using information we uncover and intelligence from a variety of sources, including government agencies." 

While the number of profiles targeting UK officials is alarming, cyber attacks are almost always less sophisticated than people imagine, according to Idax CEO Mark Rodbert.  "Technology is the most common vector, rather than the method, and cyber vulnerability often has more to do with mind-reading acts than complex technological tools," Rodbert told IT Pro.

"Cyber criminals and foreign agents draw heavily from the confidence tricksters of the past, so their methods are often quite straightforward. If you ask someone for their data, you would be surprised at how often they tell you. People make mistakes"

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
phishing

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

20 Apr 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021