LinkedIn Request To Buy From You Scam: A Deceptive Email Scheme That Has Nothing To Do With Actual LinkedIn
Table of Contents
A Business Inquiry That Isn’t What It Seems
The LinkedIn Request To Buy From You Scam is an email-based scheme that masquerades as a legitimate business opportunity. Fraudsters craft these messages to appear as genuine purchase inquiries, aiming to deceive recipients into revealing personal details. Understanding how these scams operate can help users avoid falling victim to them.
An Impersonation Tactic to Gain Trust
In this particular scam, cybercriminals pose as a professional named Elizabeth J Moore, claiming to be an "Executive Sales Director" involved in sourcing and marketing. The email states an interest in purchasing products and requests a catalog to be sent to a designated email address. To make the request appear legitimate, the email includes a blue "Reply" button.
Here's what the fraudulent message says:
Subject: Please reply new business message from Elizabeth J
Elizabeth sent a request to buy from you.
Elizabeth J Moore
Executive Sales Director (Sourcing, Marketing, Merchandising)
January 2
Reply
Hi *****
Hi dear friend, We would like to inquire about your products. send your catalog
to replytoc4c@...seemore
A Fraudulent Website Disguised as a Login Page
Clicking the provided button redirects recipients to a deceptive webpage designed to mimic legitimate email login portals, such as Gmail or Yahoo Mail. The goal is to trick users into entering their login credentials. Once these details are submitted, scammers gain access to the victim's email account, potentially exposing personal and financial data.
Exploiting Stolen Credentials for Further Fraud
Once scammers obtain access to an email account, they may impersonate the account owner to defraud others. They could send messages to friends, family, or colleagues requesting money transfers or confidential information. Additionally, compromised accounts might be used to send more phishing emails or spread online threats to other unsuspecting users.
The Risks of Phishing Attacks
Phishing scams, like this LinkedIn scheme, are designed to extract sensitive information by pretending to be legitimate communications. These scams often impersonate trusted companies, banks, or well-known professionals to make their fraudulent messages seem credible. If users fail to recognize the deception, they risk identity theft, financial loss, and other consequences.
Other Phishing Email Examples
Similar email scams include messages with deceptive subject lines like "Storage Space Running Low," "Scan Contract," or "Webmail - Fraudulent Activity Alert Notice." These fraudulent emails may request users to take urgent action, such as verifying their accounts or opening suspicious attachments. Being cautious of such emails is crucial to maintaining online security.
How Phishing Emails May Distribute Online Threats
Some fraudulent emails do more than steal credentials; they may also contain harmful attachments or links. Cybercriminals often attach seemingly harmless files, such as MS Office documents, PDFs, script files, or compressed archives, which could lead to further security risks. When opened, these files may prompt users to enable macros or take other actions that result in unauthorized software installation.
Deceptive Links That Lead to Security Risks
Apart from attachments, phishing emails frequently contain links that direct users to fraudulent websites. Some of these sites are designed to automatically download harmful software, while others trick users into manually installing deceptive programs. Clicking on these links without verifying their legitimacy could expose a device to security threats.
How to Stay Safe From Phishing Scams
To avoid falling victim to phishing scams like the LinkedIn Request To Buy From You Scam, it is essential to carefully examine emails before interacting with them. Be especially cautious with messages from unknown senders or those that seem unexpected. Avoid clicking on links or opening attachments unless you are sure they come from a trusted source.
Bottom Line
Users should only download software from official websites and reputable app stores. Avoid obtaining programs from unknown sources, as they may lead to unwanted downloads. Staying informed about common online scams and recognizing their warning signs can help individuals protect their accounts and personal information from fraudulent schemes.







