LinkedIn's Covert Scanning of Users' Browsers Exposed
Severity: High (Score: 66.5)
Sources: News.Ycombinator, Bleepingcomputer
Summary
A report named 'BrowserGate' reveals that LinkedIn is secretly scanning users' browsers for over 6,000 Chrome extensions, collecting sensitive data linked to identifiable user profiles. This covert operation affects LinkedIn's one billion users, as it targets known individuals rather than anonymous visitors. The scanning method involves injecting JavaScript into user sessions to check for installed extensions, which can reveal personal information, including political beliefs and job-seeking activities. The report claims that LinkedIn uses this data to enforce threats against users of competing tools and has expanded its scanning capabilities significantly since 2024. The company has denied wrongdoing, stating that the data is used for platform protection. However, the implications of this data collection raise serious privacy concerns. The situation has prompted calls for regulatory action against LinkedIn's practices. Key Points: • LinkedIn scans for over 6,000 Chrome extensions, collecting sensitive user data. • The covert scanning targets identifiable users, not anonymous visitors. • LinkedIn has faced criticism for potential corporate espionage and privacy violations.
Key Entities
- Data Breach (attack_type)
- BrowserGate (campaign)
- Germany (country)
- T1041 - Exfiltration Over C2 Channel (mitre_attack)
- Chromium (platform)