MI5 warns of foreign agents using LinkedIn to steal information

Some UK government departments are thought to have engaged with fake profiles linked to hostile states

A collection of digital profiles

More than 10,000 British nationals have been approached by fake LinkedIn profiles that are associated with hostile states, according to MI5. 

The UK's security organisation believes that any users that accepted such a request might have been tricked into sharing secrets. 

A campaign has been launched by the Centre for the Protection of National Infrastructure (CPNI) called Think Before You Link, which warns that foreign agents are targeting officials with access to sensitive information. The project shares concerns that once a request has been accepted, the victim's colleagues will be more likely to accept a follow-up request as it looks like they share a mutual acquaintance Nearly all government departments and some key industries are thought to have been targeted by fake LinkedIn accounts. A large number of those approached might have engaged with the profiles that contacted them, which may have offered speaking or business and travel opportunities as ways to extract confidential information. LinkedIn said it "welcomed" the efforts of the CPNI and its Think Before You Link campaign.

Related Resource

The definitive guide to IT security

Protecting your MSP and your customers

The definitive guide to IT security for MSPs - whitepaper from LiongardDownload now

"We actively seek out signs of state-sponsored activity on the platform and quickly take action against bad actors in order to protect our members," the company said in a statement. "Our Threat Intelligence team removes fake accounts using information we uncover and intelligence from a variety of sources, including government agencies." 

While the number of profiles targeting UK officials is alarming, cyber attacks are almost always less sophisticated than people imagine, according to Idax CEO Mark Rodbert.  "Technology is the most common vector, rather than the method, and cyber vulnerability often has more to do with mind-reading acts than complex technological tools," Rodbert told IT Pro.

"Cyber criminals and foreign agents draw heavily from the confidence tricksters of the past, so their methods are often quite straightforward. If you ask someone for their data, you would be surprised at how often they tell you. People make mistakes"

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
phishing

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

20 Apr 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
RMIT to be first Australian university to implement AWS supercomputing facility
high-performance computing (HPC)

RMIT to be first Australian university to implement AWS supercomputing facility

28 Jul 2021