---
title: "Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata | DMARC Report"
description: "Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata from DMARC Report explains practical steps for email authentication, domain protection."
image: "https://dmarcreport.com/og/blog/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata.png"
canonical: "https://dmarcreport.com/blog/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/"
---

Quick Answer

\_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Flinkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Linkedin%20Phishing%20Alert%2C%20AI%20Targets%20Inboxes%2C%20Ransomware%20Hits%20Sensata&url=undefined%2Fblog%2Flinkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Flinkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Flinkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata%2F&title=Linkedin%20Phishing%20Alert%2C%20AI%20Targets%20Inboxes%2C%20Ransomware%20Hits%20Sensata "Share on Reddit") [ ](mailto:?subject=Linkedin%20Phishing%20Alert%2C%20AI%20Targets%20Inboxes%2C%20Ransomware%20Hits%20Sensata&body=Check out this article: undefined%2Fblog%2Flinkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata%2F "Share via Email") 

![Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![What is dmarc 8943 150x150](https://media.mailhop.org/dmarcreport/images/2025/04/what-is-dmarc-8943-150x150.jpg) 

> The support tickets we get after a spoofing incident all start the same way: ‘we didn’t know someone was sending email from our domain,’ says Vasile Diaconu, Operations Lead at DuoCircle. DMARC reporting would have caught it weeks earlier. The cost of monitoring is nothing compared to the cost of a successful impersonation attack.

\_According to the [FBI’s 2022 Internet Crime Report (IC3)](https://www.ic3.gov/Media/PDF/AnnualReport/2022IC3Report.pdf), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-23643">
						<source src="https://media.mailhop.org/dmarcreport/images/2025/04/Linkedin-Phishing-Alert-AI-Targets-Inboxes-Ransomware-Hits-Sensata.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M10S">2:10</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-23643" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-23643" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-23643" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-23643" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/&t=Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/&url=Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2025/04/Linkedin-Phishing-Alert-AI-Targets-Inboxes-Ransomware-Hits-Sensata.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/" class="input-link input-link-23643" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-23643" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-23643” readonly/>

```
					<button class="copy-embed copy-embed-23643" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

Hello people! Hope you have managed to \*\*safeguard yourself from the clutches of threat actors. We are here again with our weekly dose of cyber news. Today, we will talk about the steep surge in instances of LinkedIn phishing scams. We will also explore how AI [threat attack](https://thehackernews.com/2024/07/tag-100-new-threat-actor-uses-open.html) is no longer just a fantasy concept in a **Hollywood movie**. Lastly, we will focus on the recent ransomware attack on Sensata Technologies.

Are you all set to dive deeper into the details?

Here you go!

## Job seekers, beware of LinkedIn phishing scams!

Are you actively looking for job opportunities on LinkedIn? Or do you rely on LinkedIn for freelance projects? If so, you need to see this!

LinkedIn is no longer a safe haven for professionals because threat actors have started exploiting this [professional networking platform](https://www.smacnagreaterchicago.org/news/technology/leveraging-linkedin) too. With a user base of a whopping [1 billion](https://news.linkedin.com/about-us#Statistics), LinkedIn tends to be a treasure trove of data for cyberattackers. While the USA tops the chart with [250 million](https://www.statista.com/statistics/272783/linkedins-membership-worldwide-by-country/) users, India stands second with [150 million ](https://www.statista.com/statistics/272783/linkedins-membership-worldwide-by-country/)users.

![Dmarc offic 365](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-offic-365-6128.jpg) 

Job seekers, as well as **service providers**, widely use LinkedIn for active work opportunities. This is where threat actors come in with their [social engineering](https://www.infosecurity-magazine.com/news/credential-compromise-social/) tactics. These [cybercriminals](https://www.voanews.com/a/alleged-leader-of-cybercriminals-extradited-to-us/7741605.html) often pose as decision makers or hiring managers of renowned organizations. They publish fake job postings and send out [malicious DMs](https://www.tomsguide.com/computing/mobile-apps/tiktok-hit-with-malicious-malware-thats-taking-over-accounts-dont-open-those-dms) and emails. Their ultimate goal is to collect your [sensitive data](https://www.csoonline.com/article/3819170/nearly-10-of-employee-gen-ai-prompts-include-sensitive-data.html).

Such malicious emails often carry \*\*subject lines that create a sense of curiosity or panic. For example, “Account Suspended,” “ LinkedIn profile security alert ,” “You have 1 new messag\_e,” or “ You appeared in 4 searches this week” are some of the commonly used subject lines by cybercriminals\_. The moment you download any PDF, click on a [malicious link](https://www.scworld.com/news/new-usps-text-scam-uses-unique-method-to-hide-malicious-pdf-links), or even enter your credentials, know that there’s no looking back. As many as [52%](https://thelogicalindian.com/linkedin-scams-exploit-professionals-fake-mentors-phishing-attempts-and-job-offers-on-the-rise/) of US businesses have already fallen prey to LinkedIn scams.

![What is dmarc](https://media.mailhop.org/dmarcreport/images/2025/04/what-is-dmarc-5189.jpg) 

_Experts recommend that users stay highly vigilant. Before opening any email, make sure the email address ends with @linkedin.com._ Also, it is a smart move to hover over any link to find out where it will lead to eventually. You can also pay close attention to the profile details of the person who has approached you with any kind of work opportunity. Details like no profile picture, discrepancies in the **experience section**, newly created LinkedIn profile, etc., may hint towards potential phishing attempts.

## Outlook, Gmail, and Apple mail users are being targeted for AI-backed threat attacks!

AI-backed phishing scams are no longer just a sci-fi fantasy concept ! A recent [blog](https://www.security.com/threat-intelligence/ai-agent-attacks) shows how AI makes it convenient to carry out phishing scams. AI agents or operators are making the most out of AI [LLMs](https://www.ibm.com/think/topics/large-language-models). These \*\*semi-autonomous AI agents are now in a position to carry out [phishing attacks](https://cybersecuritynews.com/detecting-phishing-attack-artificial-intelligence/) with zero to minimal human intervention.

Experts believe that these [AI](https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence) operators are now capable of scanning different platforms, such as **LinkedIn**, to find the right targets, look for malicious email templates online, and come up with compelling emails. _In all these, they will require no human assistance apart from the initial instructions_.

![Dmarc record generator](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-record-generator-3399.jpg) 

For the past couple of years, experts have suggested that AI can make phishing attacks highly sophisticated. Now, finally, that **prediction is coming true**, and it is indeed a cause for concern. 

This recent development is a staggering reminder that neither organizations nor individuals are safe. [AI-driven phishing campaigns](https://www.malwarebytes.com/blog/news/2025/02/how-ai-was-used-in-an-advanced-phishing-campaign-targeting-gmail-users) can easily evade conventional [threat detection mechanisms](https://www.ilink-digital.com/insights/blog/threat-detection-investigation-response-mechanisms-for-strengthening-cybersecurity/). Cybersecurity experts urge users to bolster their [cyber defense](https://www.sailpoint.com/identity-library/cyber-defense) systems as well as re-evaluate their **current security systems**.

## Sensata Technologies targeted by ransomware groups!

Last weekend, on Sunday, April 6, [Sensata Technologies](https://www.forbes.com/companies/sensata-technologies-holding/) was targeted by a ransomware group. They encrypted a specific **part of the company network**, resulting in operational disruption. Because of the [ransomware attack](https://www.bleepingcomputer.com/news/security/sensata-technologies-hit-by-ransomware-attack-impacting-operations/), business operations at Sensata have been hampered. _Functions like shipping, manufacturing, receiving, etc, have been interrupted_. 

![Create dmarc record](https://media.mailhop.org/dmarcreport/images/2025/04/create-dmarc-record-5172.jpg) 

A [sensor-solutions manufacturing company](https://www.infineon.com/cms/en/applications/solutions/sensor-solutions/), Sensata Technologies, took immediate \*\*mitigation steps to restore its business operations. But they are still not sure when the systems will be completely restored. Sensata has been working closely with external [cybersecurity](https://dmarcreport.com/blog/major-cybersecurity-trends-that-will-reign-in-2024/) experts to investigate the ransomware attack. The initial investigation suggests that threat actors managed to gain [unauthorized access](https://www.reuters.com/business/media-telecom/us-committee-slaps-60-million-fine-t-mobile-over-unauthorized-data-access-2024-08-14/) to the company network, thereby [exfiltrating data](https://www.fortinet.com/resources/cyberglossary/data-exfiltration#:~:text=Data%20exfiltration%20typically%20involves%20a,any%20data%20from%20a%20device.) from the organization’s network.

Cybersecurity experts urge strengthening [DMARC](https://dmarcreport.com/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [SPF](https://autospf.com/blog/spf-guide-understanding-sender-policy-framework/) as Sensata Technologies falls victim to ransomware groups.

![Dmarc report](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-report-7890.jpg) 

Sensata is still trying to figure out the exact data files that have been wiped by the ransomware group. Once they have **complete clarity**, Sensata will inform the affected [stakeholders](https://www.investopedia.com/terms/s/stakeholder.asp).

As of now, Sensata is hopeful of \*\*zero material impact \*\*on its finances. But they are waiting to identify the full scope as well as the final impact of the ransomware attack.

Also, so far, no ransomware group has yet claimed responsibility for the attack on Sensata Technologies.

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ News ](/tags/news/)[ SPF ](/tags/spf/) 

![Brad Slavin](https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 4m  Adidas Data Breach, Whatsapp Image Threat, Silent Ransom Vishing  May 29, 2025 ](/blog/adidas-data-breach-whatsapp-image-threat-silent-ransom-vishing/)[  Foundational 4m  Africa Fights Cybercrime, Attention Farmers Customers, Apple Prevents Threats  Aug 28, 2025 ](/blog/africa-fights-cybercrime-attention-farmers-customers-apple-prevents-threats/)[  Foundational 4m  AI Scam Alert, Federal Cuts Vulnerability, American Tire Cyberattack  Sep 9, 2025 ](/blog/ai-scam-alert-federal-cuts-vulnerability-american-tire-cyberattack/)[  Foundational 4m  Akira flaunts victims, Idaho targets orthodontist, AI granny protects  Nov 22, 2024 ](/blog/akira-flaunts-victims-idaho-targets-orthodontist-ai-granny-protects/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata","description":"Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata from DMARC Report explains practical steps for email authentication, domain protection.","url":"https://dmarcreport.com/blog/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/","datePublished":"2025-04-11T08:26:59.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2025-04-11T08:26:59.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://dmarcreport.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/"},"articleSection":"foundational","keywords":"dkim, DMARC, News, SPF","wordCount":1140,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Linkedin Phishing Alert, AI Targets Inboxes, Ransomware Hits Sensata","item":"https://dmarcreport.com/blog/linkedin-phishing-alert-ai-targets-inboxes-ransomware-hits-sensata/"}]}
```
