Hackers hijack LinkedIn comments to spread malware

Experts have warned that phishing attacks are now appearing in LinkedIn comments. Hackers are exploiting the platform's comment sections to distribute malware. Users are advised to stay vigilant against suspicious links in these interactions.

In a concerning development for social media security, hackers have begun hijacking comments on LinkedIn to propagate malware. According to a report from TechRadar, published on January 14, 2026, this tactic involves phishing schemes embedded within the professional networking site's discussion threads.

The article highlights how cybercriminals are leveraging the trust users place in LinkedIn interactions to trick individuals into clicking malicious links. While specific details on the malware's nature or affected users remain undisclosed in the available information, the warning underscores the evolving risks on professional platforms.

Experts emphasize the importance of scrutinizing any unsolicited links or attachments in comments, particularly those urging immediate action or offering dubious opportunities. This incident serves as a reminder that even established networks like LinkedIn are not immune to sophisticated cyber threats.

As phishing evolves to infiltrate comment sections, users and organizations are encouraged to enhance their cybersecurity practices, including regular software updates and awareness training.

Verwandte Artikel

Illustration depicting VoidLink Linux malware infiltrating cloud infrastructures, as discovered by Check Point researchers.
Bild generiert von KI

Check Point discovers advanced VoidLink Linux malware for clouds

Von KI berichtet Bild generiert von KI

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Cybersecurity experts warn that hackers are leveraging large language models (LLMs) to create sophisticated phishing attacks. These AI tools enable the generation of phishing pages on the spot, potentially making scams more dynamic and harder to detect. The trend highlights evolving threats in digital security.

Von KI berichtet

Hackers are targeting WhatsApp users with a new GhostPairing scam that allows full account access without cracking passwords or encryption safeguards. The scam bypasses traditional authentication methods, posing a significant risk to user privacy and security. Users are advised to check the Linked Devices section to detect any compromises.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Von KI berichtet

Criminals have distributed fake AI extensions in the Google Chrome Web Store to target more than 300,000 users. These tools aim to steal emails, personal data, and other information. The issue highlights ongoing efforts to push surveillance software through legitimate channels.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Von KI berichtet

Angesichts des anstehenden Idul Fitri fordert IT-Experte Supangat von der Untag Surabaya die Öffentlichkeit auf, die Wachsamkeit gegenüber Betrügereien über WhatsApp und SMS zu erhöhen. Steigende digitale Transaktionen werden von Cyberkriminellen ausgenutzt. Vida-Gründer Niki Santo Luhur benennt zwei Hauptmethoden: Phishing und Malware, die in Indonesien verbreitet sind.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen