Hacked.com icon

hacked.com

How to Recover a Hacked LinkedIn Account

LinkedIn logo on blue background

LinkedIn takeovers are high-impact because they turn your professional identity into an abuse channel. Attackers use compromised profiles to run recruiter scams, fake job posts, vendor fraud, and partner phishing. Recovery works when you secure the inbox first, cut off attacker sessions, and then clean up the profile and messaging surface.

Start here: containment decisions

Signal First action Why
You can still log in on at least one device Change the password, end unknown sessions, and enable stronger authentication. Containment fails if attacker sessions stay active.
You are locked out and the email or password was changed Use LinkedIn's recovery flow and secure the email inbox immediately. The inbox is the reset button. If it is compromised, recovery is unstable.
LinkedIn says the account is restricted Follow the on-screen identity check and read the restriction reason before retrying. Restriction can be tied to identity, content, or compromise, and the next step depends on which one applies.
Your profile is messaging recruiters, clients, or vendors with links or attachments Warn likely targets through another channel and stop outreach while you contain. Your contacts are the next victims.
You clicked a suspicious attachment or installed something before the takeover Assume device compromise and validate the device before re-entering credentials. Infostealer malware can steal sessions again after resets.

If you only do one thing: secure the email inbox tied to LinkedIn before you touch profile fields or outreach messages. If the inbox is still exposed, every reset is temporary.

Start with the control plane

LinkedIn recovery is easier when you treat it as identity incident response, not a profile-editing exercise. The control plane is your email inbox, your phone number, your sessions, and the device you are using to recover. If any one of those is still controlled by the attacker, they can move back in after you change the LinkedIn password.

If the compromise appears across multiple services, use how to identify scam emails and phishing as the baseline, then check account takeover and session hijacking to separate password theft from token theft. If the device itself looks suspicious, stop and validate it before you continue.

Do not create a new LinkedIn profile to work around the problem. That gives the attacker more room to impersonate you, and it makes trust repair harder later.

If you can still sign in

Secure the email inbox first

End unknown sessions in the email account, change the password to a unique value, and review forwarding rules or recovery addresses. If the inbox is compromised, the attacker can reset LinkedIn again while you are working. This is the same pattern you would expect from business email compromise: the attacker does not need to own everything, only the reset path.

Then move the inbox away from reuse. Use a password manager, rotate any reused password, and make sure the email account that controls LinkedIn is not also the recovery email for every other service. If the email account itself is noisy, fix that before you touch LinkedIn settings.

Reset LinkedIn and end sessions

If you can access your account, change the LinkedIn password and sign out unknown sessions. If you are unsure whether the password change is enough, remember that session tokens can survive the password reset until you explicitly end access. That is why the first pass is containment, not cosmetics.

After the password change, review the devices and browsers that still have access. Remove anything you do not recognize, and avoid logging back in from a browser profile that already looks compromised. If you need a broader containment checklist, use been hacked? take these steps immediately as the incident baseline.

Restore profile integrity

Attackers often modify the profile to improve scam conversion: new phone numbers, new email addresses, new job titles, new featured links, or a refreshed headline that looks more legitimate to targets. After access is stable, revert any changes you did not make. Focus on headline, about section, contact details, experience, and featured URLs.

Do not assume the profile is clean just because the password is yours again. LinkedIn abuse often lives in the details that make a recruiter or vendor trust the account. That includes location changes, profile photo swaps, company name tweaks, and links that redirect off-platform.

Stop outbound harm

If the account sent messages while it was compromised, warn likely victims with one clear message and one verification rule. Keep the warning short. The goal is to reduce harm, not to produce a long explanation that gets ignored. If the attacker posted fake offers, use the same logic and route recipients back to the original contact channel before they click anything.

When a profile is used to scam contacts, the right mental model is the same as an email compromise: trust is the payload. The attacker is using your name, your history, and your profile structure to get a faster response than they would get from a random account.

Review connected apps and recovery methods

Remove anything you do not recognize, including integrations that can continue to read mail or sign in on your behalf. Update or replace recovery methods so the account has a secondary email address or phone number that you actually control. LinkedIn's help pages now explicitly recommend a second email address or phone number, and they say you can use identity verification if you can no longer access any of the email addresses or phone numbers associated with the account.

For harder sign-in cases, set up two-factor authentication again once the control plane is stable. Do not try to harden the account before the recovery channels are clean, or you can lock yourself into the wrong recovery path.

If you are locked out

LinkedIn's current No access to email address guidance is the right branch when you cannot reach the email address or phone number tied to the account. The page says to start from Forgot password, enter the current email or phone number, then choose Can’t access this email? or Don’t have access to any of these? if needed. On desktop, it also shows a QR code step before you enter a new email address and verify identity with a government-issued ID.

The important part is not the exact screen sequence, it is the order. First, re-open the reset path. Second, use a recovery method you still control if one exists. Third, verify identity only after you have no remaining reset route. That keeps the attacker from replacing your recovery method faster than LinkedIn can check it.

Safety note: LinkedIn says it will not ask for your password or ask you to download programs. If a DM, email, or support offer says otherwise, treat it as hostile.

If LinkedIn says the account is restricted

LinkedIn's Account restrictions page separates content violations, profile violations, identity violations, and automated tools violations. It also says that if LinkedIn finds signs that an account has been compromised or taken over, it may restrict the account proactively to protect the member's information. In that case, the recovery step is to log in and follow the on-screen prompts to verify identity.

That distinction matters. A restriction can mean the profile contains something LinkedIn objected to, or it can mean the account is being protected after a takeover. If you guess wrong, you waste time in the wrong flow. Read the reason first, then follow the branch the platform gives you.

If fake recruiters or fake jobs were posted

Attackers often use a compromised LinkedIn account to post fake jobs, promote urgent opportunities, or pressure people to move off-platform. LinkedIn's Reporting jobs on LinkedIn page says to open the job details page, choose Report this job, and then pick the spam or scam category when the post asks for personal information, payment, equipment purchases, or an immediate move off-platform. If the problem is impersonation or a fake profile, use Report fake profiles.

That reporting step matters for trust repair too. If your contacts saw the fake post before you recovered the account, they need a clean signal that the posting was not legitimate. Separate the public cleanup from the password reset so the workflow stays legible.

After recovery: rebuild trust

Once the account is stable, rebuild the public profile in the order other people see it: contact details, headline, about section, work history, featured links, and recent activity. Remove or correct anything that would make a recruiter, vendor, or coworker trust the wrong message. If the attacker changed your job title or company, fix that before the next round of outreach.

Then clean the messaging surface. Review recent DMs, sent connection requests, and any comments or posts that were used to carry the scam. If you need to notify contacts, do it once, through a separate channel, with a simple warning and a clear time boundary. Repeating the same warning many times makes it look noisy, not credible.

If you received phishing email about the compromise, forward the suspicious email to LinkedIn's phishing content process or report the message inside the platform. LinkedIn's phishing guidance also says that suspicious messages or comments can be reported from the More menu, and it repeats the key rule that legitimate LinkedIn communications do not ask for your password or send you to download software.

Common mistake: changing the password but leaving forwarding, stale sessions, or a compromised recovery email in place. That only resets the countdown.

Prevent repeat compromise

LinkedIn recovery is durable when three things are true: the email inbox is stable, the password is unique, and the account can be resecured without depending on the same device you used during the compromise. A password manager helps with the first part, but it does not replace device hygiene or recovery-method cleanup.

  • Use a password manager and unique passwords.
  • Keep a second email address or phone number attached to the account.
  • Keep two-factor authentication enabled after the recovery path is stable.
  • Treat unexpected links, attachments, and verification requests as hostile.
  • Review active sessions after travel, device changes, or a security alert.

For a broader hardening pass after the incident, use how to secure your LinkedIn account. If the takeover was part of a wider compromise, compare the incident with how to check if you've been hacked so you do not miss another exposed account.

LinkedIn recovery becomes manageable when you treat it as identity incident response: secure the inbox, revoke sessions, restore integrity, and reduce the chance that one credential can be reused elsewhere. That approach prevents the common loop where the attacker walks back in after you think the account is recovered.

The goal is not just to get the account open again. It is to make the account boring enough that the next alert is a real anomaly, not another path back in for the same attacker. Once the inbox is clean, recovery methods are yours, and sessions are controlled, LinkedIn stops being an easy scam relay and becomes just another account you can maintain.

When the profile is restored and the public trust surface is cleaned up, the account should look predictable again. The final check is simple: do the contact details match, do the sessions match your devices, and can you explain every recent post or job item without guessing? If the answer is yes, the incident is under control.