Adversaries send spearphishing messages through third-party services , LinkedIn, Slack, Microsoft Teams, Twitter/X, Zoom, and dating apps , to elicit sensitive information, bypass traditional email security, and establish trusted communication channels for further exploitation.
Spearphishing via third-party services represents one of the most evasive and effective attack vectors in modern cybersecurity. Unlike traditional email phishing, service-based attacks exploit the inherent trust users place in platforms like LinkedIn, Slack, Microsoft Teams, and Twitter/X. These platforms are whitelisted by most security filters, meaning malicious messages arrive directly in the victim's inbox, notification feed, or direct message stream , completely bypassing perimeter email defenses including Secure Email Gateways (SEGs), DMARC/DKIM/SPF verification, and URL sandboxing.
The 2020 Zoom phishing scam demonstrated how attackers exploited the surge in remote work, sending fake Zoom meeting invitations that harvested credentials from over 500,000 accounts. LinkedIn recruiting scams have targeted executives with personalized InMail messages containing malicious links disguised as job opportunities. Twitter/X DM phishing has been used in state-sponsored campaigns, where attackers impersonate journalists or colleagues to deliver credential harvesting pages.
What makes this technique particularly dangerous is its multi-channel nature. An attacker can simultaneously reach a target through LinkedIn, Slack, Teams, and personal email , creating a coordinated campaign that overwhelms the victim's ability to discern legitimate from malicious contacts. The personalization of these attacks (enabled by open-source intelligence gathering via techniques like T1589.003 and T1591.004) makes them nearly indistinguishable from genuine business communication.
Case Study The LinkedIn Impersonation of Sarah Chen , This scenario is based on patterns observed in multiple real-world attacks and illustrates how adversaries combine open-source intelligence gathering with third-party service phishing to compromise high-value targets.
The attacker views third-party services as trusted delivery mechanisms that bypass traditional security controls. The goal is to establish communication through a platform the target already uses and trusts, gradually build rapport, and extract credentials or sensitive information without triggering suspicion.
The defender must protect an expanding attack surface that extends far beyond email. The challenge is to maintain security visibility across all communication channels without impeding legitimate business communication and collaboration.
Humans use mental shortcuts (heuristics) to make quick trust decisions. When we see a message from a "known" platform with a familiar logo and interface, our brain automatically applies the "platform trust" heuristic , assuming the message is safe because the platform is legitimate. Attackers exploit this by delivering malicious content through trusted platforms, knowing the platform's branding will trigger an automatic trust response in the victim's brain.
Psychological ExploitMost security teams monitor email closely but have limited or no visibility into Slack, Teams, LinkedIn, and other messaging platforms. This creates a "security gap" , an entire category of communication that is completely unsupervised. Attackers deliberately target these blind spots because they know the messages will never be scanned by email security tools, URL filters, or DLP systems.
Security GapThe average professional receives dozens of notifications daily across multiple platforms. This constant stream of alerts creates "notification fatigue" , a state where users stop carefully evaluating each notification and instead respond on autopilot. Attackers exploit this by timing their phishing messages during peak notification hours, when victims are most likely to click without thinking.
Behavioral ExploitWhen a target sees that a new contact has mutual connections, endorsements, or appears to be part of their professional network, the principle of "social proof" kicks in , "if other people I know trust this person, I should too." Attackers manipulate social proof by building fake networks of interconnected accounts, all supporting each other's credibility.
Social EngineeringPeople are wired to comply with authority figures. When an attacker impersonates a senior executive, IT administrator, or platform support representative, victims are significantly more likely to follow instructions , even suspicious ones. This is amplified on collaboration platforms where organizational hierarchies and roles are often visible.
Authority PrinciplePhishing messages create a false sense of urgency ("your account will be suspended," "immediate action required," "security alert") that overrides the victim's critical thinking. When combined with the trusted platform context, this urgency becomes even more effective , the victim is already in "trust mode" from the platform, and urgency pushes them to act before they can question the message's legitimacy.
Pressure TacticService-based spearphishing is one of the fastest-growing attack vectors in cybersecurity. Whether you're a security professional, IT administrator, developer, or business leader , your experience and insights can help others recognize and defend against these threats. Share your questions, observations, or lessons learned below.
This page is part of an open cybersecurity education initiative. All content is designed for defensive awareness and is based on publicly documented threat intelligence from MITRE ATT&CK, CISA, NIST, and industry research. For questions about specific threats, contact your organization's security team or report to FBI IC3.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.