An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

FACTSHEET | Sept. 1, 2022

LinkedIn Scams

LinkedIn is a great resource for professional connections, but it’s not immune from scams and malicious activity. In fact, because the platform and the connections to be made there tend to be more trusted by users, it is commonly used by criminals and hackers for profit, to spread malware, or to steal personal or sensitive data.

What are some common LinkedIn scams, and how can I protect myself?

Fake Invitations

These are fraudulent emails inviting you to connect with another LinkedIn member that could be a way to deliver malware designed to steal your information. These can be generic invitation requests or may disguise themselves as romantic approaches. It’s always wise to be cautious about clicking on suspicious links in any email, and you should never respond to a connection request in an email. Instead, use the LinkedIn platform and log into your account to check your connection requests.

Phony Job Offers

These are LinkedIn messages that claim to be from job recruiters with a great job to offer you, often one that will pay big money and allow you to work online. The offers frequently have links to sites asking you to fill out an application, upload a resume, provide personal information such as a Social Security number, or make a payment. Use caution and do independent research to determine if the sender, organization and offer are legitimate before sending any money or information.


These scams use a variety of methods to tempt users into clicking on links in emails and messages that are designed to help a thief steal LinkedIn users’ information. User profiles offer a wide variety of information scammers can use to steal personal data, access sensitive organization information, and launch targeted “spearphishing” against specific individuals or “whaling” attacks against senior members of an organization. More than one source has named bogus LinkedIn invitations as the most common phishing or spearphishing tactic, and security clearance holders are often targeted and need to be particularly vigilant. Again, the best defense is to protect your data and credentials by treating questionable emails and messages with caution, and not clicking suspicious links or opening unknown attachments.

Tech Support Impersonation

Scammers have posed as LinkedIn technicians, often warning that a member’s account is in danger, to trick people into clicking on malicious links, or offered LinkedIn technical support by phone for a fee. In a recent article LinkedIn support staff said they do not charge for customer support, offer no customer support phone number, and never ask for passwords or access to users’ computers. LinkedIn’s phishing information page adds that legitimate emails from LinkedIn are digitally signed for protection and include a security footer to help verify their authenticity. Again, users should take care when confronted with suspicious links or third-party sites offering LinkedIn assistance.

Inheritance scams

These scams that have been around for years involve emails or messages that claim a LinkedIn member is due a large inheritance, and can claim it by paying the sender a processing fee. Users who get these “advanced fee” scam messages in LinkedIn should not reply, and report the messages to the platform by clicking the “more” icon (…) at the top of the message and selecting “Report.”

How can I tell if a profile is fake?

Scammers often create fake LinkedIn profiles to support their illicit activity. These phonies can be pretty sophisticated, and might even indicate that at least one of your authentic LinkedIn connections has accepted an invitation to connect with them. While it doesn’t guarantee they are fakes, you can detect potentially sham social media profiles by watching for:

Bogus Photos

Photos that are of exceptionally good quality or images of (often lesser) known public figures. One way to check a photo’s authenticity is to use a search engine to do a reverse image search that will tell you where the image is being used online.

Incomplete Profiles

Incomplete profiles that have little to no real information about the person profiled, or have generic job titles such as “manager”.

Few Connections

Few connections that are all the same gender or have fake-looking profile photos, or a lack of connections at the organization listed in the profile.

Fake Names

Fake names that are common or generic, or the names of (often lesser) known characters or public figures.

Poor or Unusual Spelling

Poor or unusual spelling and poor grammar.

Suspicious Work History

For example, Jane’s profile says she is a top Ivy League graduate, but her work experience doesn’t support those credentials. If you’re suspicious about a person, look elsewhere online for information on the current employer listed in the profile and contact them to check it out.

Suspicious Companies

As with questionable work history, do a search and check it out – does the company exist, and is it what the profile says it is?

Little Content

A lack of content or updates and little to no engagement with other users

  Download Fact Sheet