Incident Report

Incident Report: Surge in Phishing Attacks Exploiting LinkedIn Smart Links

By

By

Access Point Consulting

Overview

A recent surge in phishing attacks has been identified, exploiting LinkedIn's Smart Links feature. These attacks leverage the appearance of trustworthiness to bypass email security measures, targeting a wide range of industries, including finance, manufacturing, energy, construction, and healthcare. The attacks occurred between July and August 2023, employing 80 unique Smart Links originating from compromised or newly created LinkedIn business accounts. The compromise of the organizations’ networks primarily occurred through the abuse of LinkedIn's Smart Links, which utilize trackable links for marketing and tracking purposes. These links, due to their structure, appear to be from reputable sources, thus evading conventional email protections. Initial signs of suspicion were raised when an unusual volume of emails containing various subjects led recipients to phishing pages.

Impact

Over 800 phishing emails targeting a broad range of industries were sent. Sensitive information, particularly Microsoft account credentials, were at risk of compromise. What makes this technique particularly insidious is the fact that Smart Links bear the domain of LinkedIn followed by an eight-character code parameter. This gives them the appearance of being from a reliable source, effectively bypassing conventional email protections.

This development underscores the need for a multi-layered approach to cybersecurity, combining technical measures with employee training. Continuous monitoring and adaptation of security protocols are crucial in the face of evolving threats. Vigilance is required even with seemingly trustworthy sources, as attackers are increasingly adept at exploiting legitimate services.

Recommendations/Mitigations

An organization's incident response plan is essential, must be properly initiated, and prove effective in mitigating attacks like these. Furthermore, Access Point recommends organizations conduct regular cybersecurity training for employees to raise awareness about phishing threats. Strengthen email security measures and consider implementing multi-factor authentication for users, as well as regularly monitor and update security protocols to adapt to evolving threat landscapes like Smart Link attacks.

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more