Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Fake accounts on LinkedIn - A problem?
Security Awareness

Fake accounts on LinkedIn - A problem?

For companies, LinkedIn is often an important network for maintaining contacts. But LinkedIn fake accounts cause security problems.

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: September 30, 2024 6 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

LinkedIn fake accounts are a growing security threat, particularly because the platform is trusted for business networking. Security researcher Brian Krebs discovered clusters of fake CISO profiles, including one that outranked the real CISO in Google search results. Fake profiles steal photos, imitate usernames with lookalike characters, and are used for social engineering, contract fraud, and money transfers. LinkedIn lacks tools for companies to mark or block fake employees themselves. The missing account creation date and absence of long tenure signals make fake senior profiles hard to detect.

Table of Contents (5 sections)

Social networks determine our everyday life, for companies LinkedIn is often an important network for maintaining contacts. But due to fake accounts on LinkedIn, major hacks and security problems rise.

Why LinkedIn?

Fake accounts on Instagram or Facebook are common. For attackers, however, LinkedIn is a valuable platform because it focuses on business relationships. The portal is popular and enjoys a good reputation, contacts are made on the platform non-stop. So if you want to network, it's particularly easy on LinkedIn. We had already written about something similar in our article on CEO Fraud. But what happens when you come across a fake account and make deals with a person who is not who they say they are?

This is exactly the problem that today's article is about. What happens to such fake accounts on LinkedIn and how can they be detected from the beginning? What should you watch out for to avoid falling for such a fake profile yourself? We clarify and help with appropriate protective measures.

Identity theft on LinkedIn is no longer uncommon

The biggest problem of fake profiles on business platforms is certainly that the risk of deception entails greater consequences. For the most part, such accounts are used to try to negotiate or directly conclude contracts and to instruct money transfers in order to get money quickly. So it is always a matter of direct fraud, which only tries to disguise itself perfidiously as business activity.

To make this possible, identity theft takes place. This is done by copying and simply stealing information and photos to give the impression that it is the person in question. The username is also often written similarly or imitated as best as possible so that it does not catch they eye either. It is often enough to append certain characters or poorly recognizable letters to a name to make it look almost identical. No one notices that unless they look very closely. And who looks very closely?

Most recently, these were increasingly profiles of Chief Information Security Officers (CISO), and with them a whole network of supposed employees was created. The problem is that even search engines get confused about displaying or filtering the correct CISO. So normal searchers also quickly get to the fake accounts on LinkedIn. The chance of recognizing them then is quite small. If even Google presents it as a plausible result, the search engine user will rarely wonder or even double check if it is the correct profile.

How thousands of CISO profiles were recently discovered on LinkedIn

Some time ago, security researcher Brian Krebs discovered several LinkedIn profiles that were obviously fake. Among others, a "Victor Sites" from Ohio introduced himself as Chevron's Chief Information Security Officer. Now even if you had been confused and asked Google about the CISO, the search engine showed the fake account on LinkedIn from Victor Sites even before that of the company's real CISO. It was therefore very difficult to tell that it was a fake.

Immediately after, Brian Krebs discovered more fake LinkedIn profiles, and the platform itself also seemed to recognize the direct connections of the fakes, as they were suggested in clusters in its own recommendations. Parts of the profiles discovered in this way were simply copied, others were supported by further sources and links in order to convey an authentic impression. He recorded his discovery in a blog article.

Who creates the fake accounts on LinkedIn and what for

That is one of the questions that remains unanswered. Because it is simply impossible to understand what greater purpose the multitude of different profiles have served. In a report by Bloomberg, North Korea is believed to be responsible for the fake accounts.

We know from the past that Russia and China have also repeatedly attracted attention when it comes to hacks or targeted identity theft. But in the end, no one can say for sure. There is only circumstantial evidence and conjecture, but no definitive proof. This will probably always be the case as long as they are not amateurs. Thus, it can at least be assumed that they are professionals.

Individual requests were mostly ignored by the profiles. None of the created accounts responded in any way to the attempt to contact them. LinkedIn itself assured that its own departments are actively working to cleanly remove such mass-created fake accounts on LinkedIn. However, as with all social networks, it is a mixture of automatism and human verifications that are supposed to weed out such fake accounts.

It is conceivable that these fake accounts can be used to launch larger-scale social engineering attacks and target selected companies. So far on LinkedIn there are

Our opinion on fake accounts on LinkedIn

LinkedIn in particular has some mechanisms that may make it easier for imposters to be perceived as authentic. Companies themselves, for example, have no means of declaring false employees as such or even having them blocked. Such things are always reviewed separately by LinkedIn and that takes time. By then, such fake accounts may have already caused a lot of damage.

At the same time, clear information that could help with identification is often missing. Among other things, the date when the account was created. It would then be immediately obvious at a glance that the account is fake, because senior employees in particular have naturally been part of LinkedIn as a career network for a very long time.

Fake accounts on LinkedIn pose a great danger. Especially because LinkedIn is generally considered to be particularly trustworthy and reputable. LinkedIn in particular has fewer problems with bots and fakes, which is why no one there assumes that they are fakes. However, it is all the more important that such accounts cannot exist for long and are combated accordingly by the platform.

Another problem: The fake accounts on LinkedIn generate real followers over time. This, in turn, makes them seem more believable. Suddenly, sources are added to support the authenticity, and more and more real accounts are added to willingly follow. Who should then be able to unmask him?

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV