I posted #OpenToWork on LinkedIn on April 8, 2026.
By April 15 β seven days later β I had received 20 unsolicited recruiter emails and InMails. Nearly three per day. Not from legitimate recruiters with real roles. From a coordinated wave of AI-generated outreach that ranged from clueless spam to outright impersonation of major corporations.
I documented every single one. What follows is an industry analysis of what is happening, who is enabling it, and why LinkedIn bears direct responsibility for letting it run unchecked.
I have 15 years of experience in SEO and web development, and 25+ years as a self-employed business operator. I know what legitimate recruiting looks like. This is not it.
What Triggered the Flood
My LinkedIn headline reads:
“25 yrs SEO, now AI-first | 20+ sites, 4,000+ pages, $0 ad spend | Bilingual Telnyx AI agents, Hugo, N8N, Airtable | Resort + local + media | Hire me”
That headline is specific, technical, and detailed. Within hours of adding #OpenToWork, AI scraping tools harvested every keyword in it β Hugo, N8N, Airtable, Telnyx, bilingual AI agents, 20+ sites, 4,000+ pages, $0 ad spend β and began generating “personalized” outreach emails that mirror my own profile back at me disguised as job descriptions.
This is not recruiting. This is automated profile exploitation at scale.
The Three Tiers of Abuse
π‘ Tier 1 β Wrong Industry Blasters
These are real recruiters using AI mass-outreach tools with zero regard for relevance. They fed the tool a keyword list, it matched my profile, and it fired.
Dylan Figuly at Careline Services contacted me about “web development and SEO opportunities.” Careline Services places Licensed Practical Nurses in New York correctional facilities. Dylan has spent his entire career in healthcare staffing. He has no tech clients, no tech roles, and no ability to place anyone in the roles he vaguely described. His email was sent from contact.dylanfiguly@executiverecruiter.com β a custom domain, at least β but the pitch was pure AI template with zero human review.
Kimberly Patrick claimed to represent Spencer Ogden β a legitimate energy and infrastructure recruiting firm. Her email proudly states their mission is “Powering the future by delivering exceptional talent to world-leading projects.” Energy infrastructure. She contacted an SEO and AI automation specialist. She sent the same email three times in four days.
π΄ Tier 2 β Resume Harvesters
These contacts have no real role. The entire operation exists to collect resumes β your personal data, your work history, your references β under false pretenses.
The tell is always the same: vague role description, no company name, and a closing line that asks you to send your resume before they’ll share any details.
Maria Pottorf sent an email from mariapottorf@gmail.com claiming to be an “Executive Search Recruiter.” Her “job description” was three bullet points that were literally my own LinkedIn profile reworded. Web Services Founder. SEO Specialist. AI Automation Innovator. No company. No salary. No industry. Just: “Send your updated resume so I can provide the full role overview.”
Melanie McElwee sent an outreach that contained an unfilled template variable in the body: “I’m hiring for a Search Engine Optimization Specialist that aligns closely with your background in [skill/company].” The AI tool forgot to substitute the placeholder. The template was exposed raw.
Budhoo Breanna claimed to represent “Partnership Hiring Company” via breannabudhoo@outlook.com. Her listed phone number β +1(265)543-865 β is not a valid US number. Area code 265 does not exist in North America. A different contact, Katherine Douglas, sent nearly identical outreach claiming the same “Partnership Hiring” affiliation from a different Gmail address. Same operation. Different face.
π¨ Tier 3 β Impersonation and Potential Fraud
This is where it gets serious. Multiple contacts used Gmail addresses crafted to impersonate some of the most recognizable companies and executive search firms in the world.
Lindsey Moody contacted me from lindseymoody.amazon@gmail.com claiming to be “Senior Manager Recruiting (Global) | Amazon.” Amazon recruiters use @amazon.com. Not Gmail. She offered a “$240Kβ$320K+” role. She sent the same email twice. Amazon has been notified.
Hila Maoz contacted me from hilamaoz.microsofthr@gmail.com claiming to be “Executive Assistant (Global) | Microsoft” recruiting for a “$240Kβ$320K+” VP role. Microsoft HR uses @microsoft.com. Not Gmail. Microsoft has been notified.
Jessica West Glisson contacted me from jessica.w.glisson.hubspot@gmail.com claiming to be a “Senior Technical Recruiter” at HubSpot. HubSpot recruiters use @hubspot.com. Not Gmail. HubSpot has been notified.
Joshua Wagstaff sent a detailed job description purportedly from WebFX β a legitimate digital marketing agency. His email came from joshuawagstafff@gmail.com. The job description he sent included a link to WebFX’s website formatted as https://www.webfx.com?utm_source=chatgpt.com β a ChatGPT-generated URL with the AI attribution still embedded. He copy-pasted a ChatGPT output without even cleaning the URL. WebFX has been notified.
Jeff Sanders contacted me from amjeffreysander1@gmail.com claiming to be “Vice Chairman at Heidrick & Struggles” β one of the most prestigious executive search firms in the world. Heidrick & Struggles partners use @heidrick.com. Not a numbered Gmail variant. Heidrick & Struggles has been notified.
The Smoking Gun β An AI Prompt Accidentally Sent
The most revealing email in this entire collection came from Samantha Bateman at Integria Consulting on April 12, 2026.
She accidentally sent me the internal AI prompt instructions being used to generate these emails instead of the output. The email began:
“Here is the candidate background written following your exact pattern with ALL CAPITAL LETTERS SUBJECT LINE, candidate name after ‘Hi’, and no dashes.”
That is not a recruiter reaching out. That is someone feeding my LinkedIn profile into an AI tool and forwarding me the prompt response by mistake. Every stylistic quirk she described β the all-caps subject line, the name placement, the dash formatting β matches the template pattern used across at least a dozen of the other emails I received.
One accidental send confirmed what the full pattern already made obvious: these emails are not written by humans. They are generated in bulk by AI tools fed with scraped LinkedIn data.
The Tools Enabling This
These AI-powered sales and recruiting automation platforms are the infrastructure behind the flood. Each is a legitimate business being used irresponsibly by bad actors:
Apollo.io β LinkedIn scraper and mass email sequencer. Harvests contact data and automates personalized outreach at scale.
Instantly.ai β AI email personalization with burner domain rotation designed to evade spam filters.
Seamless.AI β Real-time contact data scraping directly from LinkedIn profiles.
Clay.com β Scrapes LinkedIn data and pipes it directly into AI personalization workflows.
Expandi.io and Dripify β LinkedIn automation tools that blast InMails at scale.
Lemlist, Reply.io, and Smartlead.ai β AI-generated cold email sequences with Gmail and Outlook account rotation to avoid detection.
None of these tools are inherently illegal. All of them are being used to industrialize the exact behavior documented above.
LinkedIn’s Role
LinkedIn profits from this in two direct ways.
First, Premium and Recruiter seat subscriptions β the tools that enable InMail blasting β generate significant revenue for LinkedIn regardless of whether the outreach is legitimate. A fraudster with a LinkedIn Recruiter license is paying the same subscription fees as a legitimate executive search firm.
Second, LinkedIn’s #OpenToWork feature is specifically designed to surface job seekers to recruiters. It works exactly as intended β it just has no mechanism to distinguish between a real recruiter with a real role and an AI tool operator running a resume harvesting operation.
LinkedIn knows this is happening. The pattern is too widespread and too consistent to be invisible to a platform with their data infrastructure. The question is whether they have sufficient financial incentive to stop it.
We filed a BBB complaint against LinkedIn LLC on April 15, 2026. The full text of that complaint is published on our accountability site at AllegedFraud.com.
What Legitimate Recruiting Looks Like
For contrast: in the same seven-day period, I received exactly zero contacts from recruiters who named a specific company, a specific role with a defined scope, a salary range tied to a real job posting, and used a verified corporate email address.
Legitimate executive recruiters lead with the company name or at minimum the industry vertical. They use corporate email. They describe the role before asking for your resume. They don’t send the same email three times. They don’t use Gmail addresses while claiming to represent Fortune 500 companies.
The full documented exhibit list β all 20 contacts with complete email text, sender analysis, and tier classification β is available at AllegedFraud.com/linkedin-recruiter-spam.
The Bottom Line
AI outreach tools have made it trivially cheap to send thousands of “personalized” recruiter emails per day. The people running these operations have no recruiting expertise, no actual roles to fill, and no accountability. LinkedIn provides the data pipeline and collects the subscription fees.
The professionals on the receiving end waste time, erode trust in the platform, and in the worst cases hand their personal data to resume harvesting operations that have no legitimate purpose.
If you have received similar outreach, document it. File a BBB complaint. Report each contact to LinkedIn directly. The only way this changes is if the volume of complaints makes it more expensive for LinkedIn to ignore than to fix.
Tom Bowman is the founder of Bowman Web Services LLC, a Port Orange, Florida-based AI-first web development and digital marketing operation. He has 15+ years of SEO experience since 2009, 25+ years as a self-employed operator, and currently runs 20+ live properties.
Read the full documented exhibit file: AllegedFraud.com/linkedin-recruiter-spam