LinkedIn Smart Links attacks return to target Microsoft accounts

Hacker holding LinkedIn logo

Hackers are once again abusing LinkedIn Smart Links in phishing attacks to bypass protection measures and evade detection in attempts to steal Microsoft account credentials.

Smart Links are part of LinkedIn’s Sales Navigator service, used for marketing and tracking, allowing Business accounts to email content using trackable links to determine who engaged with it.

Also, because Smart Link uses LinkedIn’s domain followed by an eight-character code parameter, they appear to originate from a trustworthy source and bypass email protections.

The abuse of LinkedIn’s Smart Link feature isn’t novel, as cybersecurity firm Cofense discovered the technique in a late 2022 campaign targeting Slovakian users with bogus postal service lures.

New campaign targets Microsoft accounts

The email security company today reports it identified a surge in LinkedIn Smart Link abuse recently, with over 800 emails of various subjects leading a broad range of targets to phishing pages.

According to Cofense, the recent attacks occurred between July and August 2023, using 80 unique Smart Links, and originated from newly created or compromised LinkedIn business accounts.

Cofense data shows that the most targeted sectors of this latest campaign are finance, manufacturing, energy, construction, and healthcare.

Targeted sectors
Targeted sectors (Cofense)

“Despite Finance and Manufacturing having higher volumes, it can be concluded that this campaign was not a direct attack on any one business or sector but a blanket attack to collect as many credentials as possible using LinkedIn business accounts and Smart Links to carry out the attack,” explains Cofense.

The emails sent to targets use subjects relating to payments, human resources, documents, security notifications, and others, with the embedded link/button triggering a series of redirects from a “trustworthy” LinkedIn Smart Link.

Phishing email
Phishing email (Cofense)

To add legitimacy to the phishing process and create a false sense of authenticity on the Microsoft login page, the Smart Link sent to victims is adjusted to contain the target’s email address.

Smart Link's structure
Smart Link’s structure (Cofense)

The phishing page will read the email address from the link clicked by the victim and auto-fill it on the form, only expecting the victim to fill out the password, just like it happens on the legitimate login portal.

Generic Microsoft account phishing page
Generic Microsoft account phishing page (Cofense)

The phishing page resembles a standard Microsoft login portal instead of a customized, company-specific design.

While this broadens its target range, it may deter individuals familiar with their employer’s unique portals.

Users should be educated not to rely solely on email security tools to block threats, as phishing actors increasingly adopt tactics that abuse legitimate services to bypass these protections.


Original Source



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.