Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 4, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025

      One of Microsoft’s biggest hardware partners joins its “bold strategy, Cotton” moment over upgrading to Windows 11, suggesting everyone just buys a Copilot+ PC

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025
      Recent

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025
      Recent

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Lessons for Everyone to Learn from My Personal LinkedIn Account Takeover Experience

    Lessons for Everyone to Learn from My Personal LinkedIn Account Takeover Experience

    January 2, 2025

    LinkedIn Account Hacking

    The first night of New Year brought in a terrifying moment for me that many professionals fear in the online realm: the hacking of their LinkedIn account. I had no idea that my account would be compromised, especially as I was just about to kick-start the new year on the professional front too. But this experience taught me an important lesson or two not just about online security, but also about the growing risks of LinkedIn account hacking. 

    It all began on the night of January 1. I logged into my LinkedIn account, as I usually do, to check any updates and connect with my professional network. However, I noticed something unusual—I couldn’t access my account. At first, I thought it might be a temporary glitch, so I quickly switched to my laptop and tried opening my LinkedIn profile on Chrome. To my horror, my account was completely missing. 

    My LinkedIn Account Hacking 
    Hackers Deleting Profile URLs after overtaking

    Panic set in. I immediately attempted to reset my password, thinking that it was a simple login error. But no luck—my password reset attempt failed. At that moment, the reality hit: my LinkedIn account had been hacked. 

    Breakdown of My LinkedIn Account Hacking 

    As I struggled to regain access, I received an email from LinkedIn. The email stated that someone had tried to forcefully log into my account. Upon further inspection of the email, I discovered that my profile information had already been altered. My name had been changed to that of a woman named “Amy,” and an Asian (likely from China) woman’s photo had been added to my profile.

    LinkedIn Account Hacking
    LinkedIn notification of new sign in

    This was not just a simple case of a stolen password. This was an account takeover, executed by a hacker or potentially a hacker group. The situation was more unnerving than I initially realized, as I could not even log in to my own account. 

    Desperate to regain access to my account, I attempted to follow LinkedIn’s recovery process. LinkedIn prompted me to verify my identity, which included submitting a government ID and going through facial recognition verification. Fortunately, I was able to complete this process with success. 

    Cyble, a cybersecurity firm, was instrumental in helping me in the recovery process. Their expertise and timely advice were crucial during this ordeal, and they also emphasized the importance of enabling two-factor authentication (2FA) to enhance my account’s security. 

    A Cybersecurity Lesson Learned 

    Once I successfully regained access to my account, I discovered that the hackers had deleted all of my past experiences, posts, and other profile information. They replaced my profile details with fake information. The new profile bore the name “Amy,” a fashion designer from Hong Kong.

    LinkedIn Account Hacking
    Hackers changing user data after account takeover

    The hacker made several changes, starting with the profile’s username, which was updated to “Amy ~.” They also altered the title, listing “Entrepreneur/Founder/Creative Director” as the new designation, and changed the location to London, England, United Kingdom. 

    Under the “About” section, the hacker added a detailed biography of the fake individual:

    “Hello, I am Amy Zhuang, a female fashion designer from Hong Kong, who has been passionate about fashion since childhood. I graduated from Oxford University College of Art and Design and have been deeply influenced by both Eastern and Western cultures, so I am able to blend traditional and modern elements in my designs to create unique pieces.” 

    In addition to the profile information, the hacker also modified the “Experience” and “Education” sections. The personal experience section now read: Founder at Jilla Active (May 2017 – Present) in London, UK. The description added was: “Jilla Active is more than just activewear; it’s about solidarity and community love. We encourage everyone to embrace an active lifestyle with fashion-forward, comfortable clothing.” This change was made to present a professional, credible appearance. 

    The hacker also updated the education section with fake details about attending prestigious universities. The profile now claimed that the individual had studied at the University of Oxford in a postgraduate program for Literature & Art from 2008 to 2012. This made the account look even more legitimate, providing further deception to anyone who might review the profile. 

    The Widening Problem of LinkedIn Hacking 

    What I found concerning, however, was the realization that I wasn’t alone. Many other LinkedIn users had faced the same ordeal of hacking and account takeover. In my research, I discovered that many of the hacked accounts were connected to a particular name: Jilla Active, a London-based women’s activewear brand. While it’s unclear whether the company itself was involved, or if they were aware of the situation, the pattern was undeniable. It seemed that many hacked accounts had a connection to this brand. 

    The Cyber Express has reached out to the organization to learn if more incidents or individuals had reported of similar hacking incidents linked to their name. However, at the time of writing this, no official statement or response has been received.

    It became clear that hackers were targeting individuals with LinkedIn profiles connected to certain businesses or brands, especially those who may have had higher visibility or valuable connections. After hacking the accounts, they would quickly alter the name, email address, backup email, profile URL, and other details to make the profile appear completely different from the original. 

    The Importance of Two-Factor Authentication (2FA) 

    Through my recovery process, I learned a valuable lesson: two-factor authentication (2FA) is no longer optional; it’s essential. Cyble repeatedly emphasized how 2FA could have prevented this breach. By requiring an extra layer of security beyond just a password, two-factor authentication can block most unauthorized login attempts, even if the hacker knows your password. This experience prompted me to immediately enable 2FA on all my accounts, including LinkedIn, to prevent any future hacking attempts. It’s a simple step that can save your accounts from being taken over by malicious individuals. 

    The hacking of LinkedIn accounts is becoming an increasingly common phenomenon. Hackers are not just stealing passwords anymore—they are taking full control of accounts, altering profiles, and using them for various malicious activities. These account takeovers are often linked to fraudulent business ventures, scamming individuals, or gaining access to sensitive professional networks. 

    In my case, the hacking of my LinkedIn account was a personal wake-up call. But after extensive research, I found that it wasn’t an isolated incident. Many others have been victims of LinkedIn hacking, and the trend appears to be growing. 

    Final Thoughts and Ongoing Investigation 

    While I have regained control of my LinkedIn account, the damage caused by the hackers is overwhelming. They erased my past posts, endorsements, and achievements, leaving only a shell of my professional presence. The incident is still under investigation, and I will continue to monitor the situation. 

    It’s important to stay alert and aware of the threats that lurk online. The trend of LinkedIn account hacking is on the rise, and all professionals should take steps to secure their accounts. Enabling two-factor authentication, using strong, unique passwords, and regularly checking your account activity can help protect against this kind of cyberattack. As of now, The Cyber Express will continue to monitor this issue, and I will provide further updates as the investigation into these hacked accounts progresses. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBest NSFW Character AI Chat Online | Eros AI
    Next Article Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

    Related Posts

    Security

    Amazon’s $10 Billion AI Boost: North Carolina Lands Major Tech Expansion!

    June 5, 2025
    Security

    Google Proposes New Browser Security: Your Local Network, Your Permission!

    June 5, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Morgan Wallen I’m The Problem Tour 2025 Shirt

    Web Development

    Australia Invests $6.4M to Shield Healthcare Sector from Cyber Threats

    Development

    Simplified Stream Response Handling in Laravel

    Development

    Figma Biggest Update EVER!

    Web Development

    Highlights

    Development

    AI Reality VS Speculation with Google Machine Learning Engineer Jiquan Ngiam [Podcast #156]

    January 18, 2025

    On this week’s episode of the podcast, I interview Jiquan Ngiam. He’s a former Google…

    The ClipboardItem.supports() function is now Baseline Newly available

    May 20, 2025

    Microsoft’s Phi-4-multimodal is closely superior to Google’s Gemini 2.0 Flash, benchmark says

    March 16, 2025

    Complete Beginner’s Guide to Creating AI Applications with OpenAI

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.