Intentionally desktop-first — best experienced on a workstation
Portfolio
Threat Intelligence Analysis · Nation-State Operations · Platform Accountability

The Open Door —
LinkedIn's Verification Gap and the National Security Cost of Profit Over Trust

A follow-on investigation to The Hiring Trap — tracing how the platform trusted most by defense professionals became the preferred recruitment surface for nation-state espionage operations, and how a fix costing less than a Shopify plugin has been available since day one.

Analyst
Yana Ivanov
Published
March 2026
Classification
Public — Educational
Predecessor
The Hiring Trap (March 2026)
Audience
Defense Contractors · CISA · Policy
Actors Covered
China · North Korea · Iran · Russia
No tax ID required to post jobs  ·  80.6M fake accounts removed in 6 months  ·  $501M in job scam losses 2024  ·  Active DoD targeting documented by US Air Force
Section 01

Where the Last Report Left Off

The Hiring Trap examined what happens once a job seeker installs a browser extension — the permissions it quietly holds, the access it grants long after the job search ends, and what that exposure means for professionals working in or adjacent to defense. That report started with a manifest.json file and a pile of suspicious messages that arrived after an aggressive job search. It answered the question: what can these tools do with your data?

This report asks the upstream question: how did the data get there in the first place? Specifically, how does a foreign intelligence service build the target list that a browser extension eventually harvests? The answer is LinkedIn. Not because LinkedIn is inherently malicious, but because it is the world's most detailed open-source intelligence database on cleared professionals, and because posting a fake job on it requires less verification than buying a prepaid phone.

This is not a theoretical concern. It is documented, active, and ongoing. Multiple intelligence agencies, the US Air Force, the FBI, and the Department of Justice have all issued public warnings about exactly this attack surface in the past 24 months. The warnings have not changed LinkedIn's verification requirements. The attacks have continued to escalate.

Context from personal experience: During an active job search targeting defense contractors in Connecticut, I received a significant increase in unsolicited contact — WhatsApp messages offering implausible positions, emails from unverifiable recruiters, calls from numbers with no legitimate origin. The Hiring Trap documented this as evidence of data entering a secondary market through extension or platform data practices. This report examines the other half of that equation: the sophisticated operations that deliberately engineer these contacts as the first step in a much longer targeting chain.

Section 02

LinkedIn as an Intelligence Collection Platform

To understand why LinkedIn is the preferred attack surface for nation-state actors, you have to think like an intelligence analyst. A good analyst needs to answer four questions about any target: who are they, where do they work, what do they know, and when are they vulnerable. LinkedIn answers all four questions simultaneously, in detail, for free, about over a billion people — including the people who build nuclear submarines, design classified aircraft propulsion systems, and write software for command and control networks.

This is not an exaggeration. It is the documented assessment of the United States Air Force. Foreign adversaries, particularly China, are actively exploiting LinkedIn to conduct virtual espionage against current and former US Department of Defense members — creating fake profiles and lucrative job solicitations to entice targets into divulging sensitive information. This assessment was published by Air University. It is not a blog post.

What a Cleared Professional's LinkedIn Profile Actually Contains

When a defense professional maintains a LinkedIn profile, they are providing a continuously updated intelligence document that reveals career trajectory, clearance indicators embedded in job titles and program names, professional network of colleagues and supervisors, current employer with enough detail to assess program access, periods of career transition when they are most susceptible to approach, and personal context — family situation, financial stress signals, career frustrations — surfaced through posts, likes, and activity patterns.

Profile Data PointIntelligence ValueHow Adversaries Use It
Job title at defense contractorCriticalEstablishes targeting priority — confirms cleared status
Program / project names in experienceCriticalReveals which classified or sensitive programs accessed
Skills and certifications listedCriticalIdentifies value of access and knowledge to extract
Career gap or recent job changeCriticalVulnerability window — target during transition stress
Open to Work statusCriticalReal-time signal that person is actively vulnerable to recruitment approach
Professional connections listedHighMaps the cleared community — identifies additional targets
Activity — posts, likes, commentsHighReveals financial stress, dissatisfaction, family situation
Education and institutionHighRefines clearance assessment and builds credibility for approach

The Open to Work signal deserves particular attention. For foreign intelligence services, it is a real-time alert that a cleared professional is in career transition — statistically the period of highest susceptibility to a sophisticated approach. It is, functionally, a targeting beacon that cleared professionals activate themselves.

Section 03

The Nation-State Actors — Who Is Using This and How

The LinkedIn attack surface is not exploited by one adversary. It is an active operational environment for at least four nation-state programs running parallel campaigns with different objectives and different methods.

PRC
China — Multiple MSS-Linked Groups
Objective: Long-term espionage and intellectual property theft

The most documented LinkedIn threat against DoD personnel. Chinese intelligence services create elaborate fake recruiter profiles tied to convincing consulting and research firms, approach cleared personnel with flattering academic or business offers, and cultivate relationships over months before extracting sensitive information. Air University documented this as an active campaign against current and former DoD members specifically. The approach is patient, sophisticated, and rarely triggers red flags — because the goal is relationship-building, not immediate data extraction.

DPRK
North Korea — Lazarus Group / Slow Pisces / DeceptiveDevelopment
Objective: Cryptocurrency theft + defense espionage + sanctions evasion

The most technically sophisticated LinkedIn operation currently active. Operation Dream Job poses as recruiters from legitimate defense and technology firms to deliver malware through fake technical assessments. Contagious Interview weaponizes the hiring process itself — conducting realistic multi-stage interviews that end with the candidate executing malicious code disguised as a routine installation task. WageMole runs in reverse — North Korean operatives pose as qualified job seekers to get hired at Western companies and steal from the inside. The DOJ indicted four North Korean operatives in June 2025 and raided 29 laptop farms across 16 US states. The operations continued.

IRN
Iran — TA455 / Charming Kitten / APT35
Objective: Aerospace, aviation, and defense sector penetration

Iranian group TA455 runs a Dream Job variant specifically targeting aerospace, aviation, and defense sector professionals across Israel, the UAE, Turkey, India, Albania, and the United States. The campaign uses fake LinkedIn identities to deliver malware through fraudulent job offers, with infrastructure hidden behind legitimate services including Cloudflare, GitHub, and Microsoft Azure. The campaign has been active since at least September 2023. The use of legitimate cloud infrastructure to conceal command and control communications makes detection significantly harder than conventional malware campaigns.

RUS
Russia — SVR / GRU-linked operations
Objective: Intelligence community and policy personnel targeting

Russian intelligence services use LinkedIn primarily for human intelligence cultivation — identifying intelligence community personnel, policy analysts, and defense officials for long-term relationship development. The approach mirrors traditional tradecraft adapted for digital environments: establish contact through a plausible professional pretext, build credibility, identify vulnerabilities, and develop the contact as a witting or unwitting source. Microsoft has observed Russian operators working from China and other allied nations to obscure attribution and complicate defensive responses.

The AI acceleration problem: All four of these operations have been significantly enhanced by generative AI. A North Korean operative who would previously have been detectable through grammar errors can now generate fluent, idiomatic professional English. The Fireblocks CEO, who helped investigate Lazarus Group operations, noted that in 2017 it was easy to identify North Korean operators because of grammar mistakes — but now their communications appear to come from someone who graduated from Oxford. AI has removed the primary human tell that defenders relied on. Every fake recruiter profile, every phishing message, every fabricated job description now reads as legitimate.

Section 04

The Kill Chain — From Fake Company to Compromised Asset

What makes this threat distinctive is that it does not begin with a technical attack. It begins with a human interaction — a job application, a connection request, a recruiter message — that feels entirely normal because it is designed to feel entirely normal. The real leverage point is at the moment when a fake company is created with zero verification, and given the same access to a billion professional profiles as a legitimate employer.

01
Open Source Intelligence Collection

The adversary does not need to hack LinkedIn to collect intelligence. They search it. Job titles, employer names, program names embedded in work descriptions, clearance indicators, network connections, activity signals. A search for employees of a specific defense contractor returns a curated, self-updated intelligence file on every professional willing to be found. The Open to Work signal narrows this to people who are actively seeking contact from outside their current employer.

02
Fake Company Creation — The Unguarded Gate

The adversary creates a LinkedIn company page. No tax identification number required. No EIN verification. No state business registration check. No D-U-N-S number. No proof that the company exists as a legal entity anywhere on earth. A nation-state actor with a $50 budget can create a convincing defense consulting firm in under an hour. A wholesale dessert distributor in Connecticut requires more documentation to display wholesale pricing than LinkedIn requires to access a billion professional profiles.

03
Targeted Job Posting — The Bait

Fake job postings are crafted to match exactly the profile of high-value targets identified in step one. The salary is calibrated to be attractive without being implausible. The role matches their exact skill set and career trajectory. The company appears legitimate because it has a LinkedIn page, a recently registered website, and a small number of employees whose profiles were generated by the same operation. LinkedIn's algorithm distributes the posting to the most relevant candidates automatically — including the specific cleared professionals the adversary identified in step one.

04
Resume and Data Harvest

Targets apply. They submit resumes containing home addresses, personal phone numbers, personal email addresses, complete employment history with program names and project descriptions, references, and salary expectations. No malware has been deployed. No system has been hacked. The target voluntarily provided everything through a normal job application process. This data now exists outside any corporate security perimeter, in the hands of an unverified entity with no legal accountability in any jurisdiction that matters.

05
Relationship Development — The Human Layer

A sophisticated operation does not stop at resume collection. The fake recruiter follows up with a personalized message that references specific details from the resume. Screening calls are conducted. The target progresses through what appears to be a real hiring process. During this phase the adversary is learning things no resume reveals: financial pressures, career frustrations, clearance scope and program access. China's operations are documented to cultivate these relationships over months. The target experiences validation and hope — two psychological states that significantly lower critical scrutiny.

06
Psychological Exploitation — The Weakest Link

The adversary exploits specifically the emotional state of a job seeker. Desperation makes people accept risk they would otherwise reject. Fear of missing out on a rare opportunity suspends rational evaluation. Hope — especially professionally meaningful hope during a difficult search — disarms the skepticism that would normally flag inconsistencies. The FBI has explicitly documented that adversaries target individuals "expressing dissatisfaction or describing financial insecurity" — the exact profile LinkedIn makes publicly visible.

07
Technical Exploitation or Asset Recruitment

The technical attack arrives inside an established relationship. A coding test that requires running an npm package. A background check that requests credentials. An onboarding document that installs remote access software. Or no technical attack at all — a target who has been cultivated over months may cooperate willingly. North Korean operations documented by the DOJ show operatives who successfully got hired at legitimate companies, worked for months, and systematically stole intellectual property while receiving a salary. The fake job was never the destination. It was the door.

The persistence problem: Unlike a phishing email that either succeeds or fails in a single interaction, this attack chain can be run in parallel against hundreds of targets simultaneously, extended over months without triggering security alerts, and leaves no technical trace during the intelligence collection phase. A defense contractor's SOC monitors network traffic, endpoint behavior, and access logs. None of those controls see a recruiter message on a personal LinkedIn account or a resume submitted from a personal device to an unverified company page.

Section 05

LinkedIn's Verification Gap — The Technical Reality

LinkedIn's failure to implement basic business verification is not a technical problem. It is a business decision. Every technical component needed to implement it exists, works at scale, and in some cases is available for free. The gap between what LinkedIn could implement tomorrow and what it has chosen to implement is a choice — and that choice has a documented cost measured in millions of dollars of fraud losses and an undocumented cost measured in compromised cleared personnel and stolen defense secrets.

What LinkedIn Currently Requires to Post a Job

A company page that exists. A company email address for the recruiter — which can come from a domain registered this morning for twelve dollars. That is the complete verification chain. Employee count, industry, founding date, and all other company fields are self-reported with zero cross-reference against any external database.

What LinkedIn Requires
Company name (self-reported, unverified)
Company email address (any domain, no verification)
Employee count (self-reported, no verification)
Industry (self-selected from dropdown)
Founded date (self-reported, no verification)
No tax identification number
No business registration check
No EIN, VAT, or equivalent national identifier
What Every Other Institution Requires
EIN (US) — verified against IRS TIN Matching API
VAT number (EU) — verified against free VIES public API
Company registration number — cross-referenced with national registry
Business bank account — requires EIN + articles of incorporation
Payment processing — Stripe, Square, PayPal all require KYC
Shopify B2B wholesale access — requires tax ID per state
Government contractor registration — SAM.gov requires DUNS + EIN
B2B supply chain platforms — require tax ID at company creation globally

The Global Tax ID Framework LinkedIn Ignores

LinkedIn's stated reason for not implementing business verification is the complexity of operating across 200 countries with different regulatory frameworks. This argument collapses under examination. Every country with a formal economy has a national business identifier. The formats differ. The validation mechanisms exist.

Country / RegionBusiness IdentifierVerification Available
United StatesEIN — XX-XXXXXXXIRS TIN Matching API (free for authorized entities)
European Union (27 countries)VAT ID — country prefix + digitsEU VIES — free public API, zero cost
United KingdomUTR / Companies House numberCompanies House API (free)
SpainNIF / CIF — letter + 8 digitsAEAT database
FranceSIREN — 9 digitsINSEE API (free public)
CanadaBN — 9 digitsCRA Business Registry
AustraliaABN — 11 digitsABR Lookup API (free public)
IndiaGSTIN — 15 charactersGST Portal API
JapanHōjin Bangō — 13 digitsNTA public database
BrazilCNPJ — 14 digitsReceita Federal

The EU VIES system alone covers 27 countries simultaneously, is publicly accessible, and costs nothing to query. A company claiming to be based anywhere in the EU could be validated against it in a single API call. LinkedIn operates heavily across the EU. This verification is available today, requires no new infrastructure, and would eliminate a significant percentage of fake European company pages at zero cost.

The proof of concept already exists: A B2B wholesale distributor operating in Connecticut — specifically, a small Italian frozen dessert distribution business — implemented state-level tax ID validation for wholesale access pricing on Shopify. The validation handles multiple state formats, rejects invalid identifiers, and prevents unauthorized access. This was built by a single operator as a routine e-commerce requirement. The technical barrier to implementing equivalent validation at LinkedIn's scale is effectively zero. The barrier is not technical. It is a business decision to prioritize the appearance of scale over the reality of quality.

$16.4B
LinkedIn annual revenue FY2024 — earned while users lost $501M to job scams on the same platform
80.6M
Fake accounts removed in just six months of 2024 — the ones caught at registration alone
$0
Cost to query the EU VIES API — which would validate company pages across 27 countries instantly
Section 06

Why LinkedIn Won't Fix It — The Enshittification of Professional Trust

LinkedIn was once, genuinely, a useful professional network. A connection request meant something. A recruiter message was worth reading. A job posting could be taken seriously. That implicit trust is now LinkedIn's most exploited vulnerability — and also its most valuable product. The platform charges advertisers a premium specifically because its audience is "trusted professionals." It charges recruiters premium rates for access to people who treat LinkedIn messages differently from cold email. The trust that makes the platform valuable is the same trust that makes fake recruiter profiles effective. LinkedIn profits from both.

The Metric Problem

Requiring EIN verification at company page creation would immediately and dramatically reduce LinkedIn's reported number of company pages. LinkedIn's aggressive removal of 80.6 million fake personal accounts in a single six-month period suggests the fake company problem is at least proportionally significant. A sudden reduction in company page counts is a number that appears in Microsoft's quarterly earnings call. It is a number that requires explanation to shareholders. It is a number that LinkedIn's product and business teams are strongly incentivized to avoid creating.

The Microsoft Conflict of Interest

Microsoft acquired LinkedIn in 2016 for $26 billion. Microsoft also holds significant US government cloud contracts, has deep integration with DoD infrastructure through Azure and Microsoft 365, and is a trusted vendor across the defense industrial base. The same company that profits from DoD's cloud infrastructure is operating, without meaningful accountability, a platform that foreign adversaries are actively using to target DoD personnel. A defense contractor that failed to implement basic access controls on a system handling CUI would face CMMC compliance consequences. LinkedIn's status as a consumer platform appears to exempt it from the accountability frameworks that apply to every other system that touches defense information.

Section 07

The Verification Infrastructure That Already Exists

The most important point in this report is not that business verification is technically difficult. It is that it is technically trivial — and LinkedIn has chosen not to implement it. The infrastructure required to verify that a company posting a job is a real legal entity exists in every major economy, is publicly accessible, and in most cases costs nothing to query.

In the United States, state-level business registries allow anyone to verify whether a company is registered. Connecticut's Secretary of State business lookup, Florida's Sunbiz, Virginia's SCC — all free, all public, all searchable by company name. A nation-state actor creating a fake defense consulting firm cannot easily obtain a legitimate EIN without a US-based facilitator — which itself creates prosecution exposure.

Globally, the EU VIES system validates VAT numbers across all 27 member states simultaneously at zero cost. Companies House in the UK is free. Australia's ABR is free. Canada's Business Registries are free. Third-party services like Fonoa aggregate these into a single API covering more than 100 countries. The infrastructure is not the problem. The decision not to use it is.

LinkedIn's position is that operating across 200 countries makes verification too complex to implement. This argument does not survive examination. Payment processors, B2B platforms, and government contractor registries all implement cross-jurisdiction business verification as a standard requirement. The complexity is a solved problem. The decision not to apply the solution to job postings is a product and business choice — one with documented national security consequences.

How to Verify a Company Yourself — By Jurisdiction

Until LinkedIn implements verification, this is the manual process. Use the correct registry for the jurisdiction where the company claims to be based. All links open free public databases.

JurisdictionOfficial RegistryWhat You Can Verify
ConnecticutCT Secretary of StateRegistration status, registered agent, filing date
Virginia / DC areaVA State Corporation CommissionEntity status, directors, registered agent
MarylandMD Dept. of Assessments & TaxationEntity status, filing history
New YorkNY DOS Corporation DatabaseRegistration date, registered agent, status
FloridaFL SunbizFiling date, officers/directors, registered agent
US — Any StateOpenCorporates (US)Aggregates most state registries — good starting point
US Govt ContractorsSAM.govActive government contractor registration
European UnionEU VIESVAT registration across all 27 member states
United KingdomCompanies HouseDirectors, filing history, registered address
AustraliaABR LookupABN status, entity type, registration date
GlobalOpenCorporates130+ jurisdictions — best global starting point

Red Flags to Check in Any Jurisdiction

SignalHow to CheckRisk Weight
Recruiter using free email (Gmail, Yahoo)Legitimate corporate recruiters use company domain email. Free provider = no verifiable corporate affiliation.Critical
Company domain registered < 90 days agoICANN WHOIS — check Creation DateCritical
No company presence in any registryUse the registry links above. No registration = no legal entity.Critical
Request to move off LinkedIn quicklyLinkedIn warns this explicitly. Legitimate recruiters have no reason to leave the platform early.Critical
Salary significantly above marketCross-reference with Glassdoor, LinkedIn Salary, BLS.gov for the role and location.Elevated
Employee count vs. job postings mismatch5 listed employees, 40 active job postings = anomalous. Check the ratio on their LinkedIn page.Elevated
No third-party web footprintSearch: "Company Name" site:glassdoor.com and "Company Name" site:crunchbase.com. Zero results for a 50-person company is a flag.Elevated
Recruiter profile created recentlyClick three dots on their LinkedIn profile → "About this profile" → check creation date.Elevated
Section 08

What Needs to Change

For LinkedIn and Microsoft

Require tax identification verification as a condition of posting a job. The EU VIES API covers 27 countries for free. The IRS TIN Matching Program covers US entities. Third-party services like Fonoa cover over 100 countries as a commodity API. The infrastructure exists. The decision not to use it is a choice with documented consequences.

Display a clear, prominent unverified business indicator on any company page that has not completed tax ID verification — equivalent to the HTTP vs HTTPS distinction in a browser address bar. A job seeker should be able to see, at a glance, whether the company asking for their personal data has been verified as a legal entity in any jurisdiction.

For Defense Contractors and Security Teams

Personnel security programs that begin at hire are already too late. The intelligence collection described in this report happens during the job search — often years before the individual joins the organization. Security briefings that address LinkedIn specifically, that explain the Open to Work signal as a targeting beacon, and that describe the kill chain documented here are specific, technically grounded responses to documented active threats.

Cleared personnel should be advised to minimize program-specific detail in LinkedIn profiles — job titles and employers are unavoidable, but project names, facility names, and technology-specific skills provide intelligence value that benefits the adversary without providing meaningful benefit to the employee's career.

The data canary methodology: For professionals who want to identify which platforms are sharing their data, use a unique email alias for each platform — yourname+linkedin@gmail.com, yourname+indeed@gmail.com, and so on. When unsolicited contact arrives, the address it was sent to identifies which platform the data came from. Most email providers support plus addressing natively. This creates an audit trail that can attribute the source when the inevitable spam begins.

For Regulators and Policymakers

The financial industry is subject to Know Your Customer requirements because the consequences of unverified identity in financial transactions are severe and well-documented. Job posting platforms are currently subject to no equivalent requirement — despite the fact that a job posting is a transaction in which an unverified entity gains access to sensitive personal and professional data from potentially millions of people, including cleared defense personnel.

Requiring verified business identity as a precondition for posting jobs on platforms above a certain scale would impose minimal burden on legitimate employers and significant friction on the operations documented in this report. A nation-state actor cannot easily obtain a legitimate US EIN tied to a real legal entity without a US-based facilitator. Every facilitator is a potential point of exposure, prosecution, and deterrence.

All findings in this report are based on publicly available information including reports from the FBI, CISA, US Air Force Air University, Microsoft Threat Intelligence, Mandiant, Department of Justice, Federal Trade Commission, and MITRE ATT&CK. This represents the author's independent analysis and does not reflect the views of any employer or client organization.

YI
Yana Ivanov
Information Assurance & CMMC Compliance Analyst  ·  SiteWave Studio

Yana Ivanov is a security analyst and CMMC compliance consultant based in Connecticut, specializing in cybersecurity risk assessment for defense contractors in the Connecticut defense industrial base. With 15 years of enterprise technology experience and an MS in Information Systems, she brings a practitioner perspective to threat intelligence work. This report is the second in a series examining how the hiring process has become an active attack surface for foreign intelligence operations. She is currently pursuing CompTIA Security+, CMMC Registered Practitioner certification, and AZ-900.

Portfolio