This article is more than
8 year oldAn up-date on protecting our members: https://t.co/4a6EJW1JKJ
— LinkedIn (@LinkedIn) May 18, 2016
The company has advised all members to change their passwords as they take steps to contact members whose data has been compromised and invalidate the passwords of affected accounts.
Hackers gained access to the site in 2012 and posted 6.5 million encrypted passwords on a Russian hacker forum, but email addresses were not included in that dump.
The passwords f-rom both releases were encrypted with “no salt,” making them easier to crack.
A salt is a random number that is needed to access encrypted data, along with a password.
READ MORE:‘Fireme’: Leaked LinkedIn passwords reveal dubious job satisfaction
The hacker who released the data goes by the name of Peace. He is selling the information on a Darknet marketplace called The Real Deal for 5 bitcoin (around $2,200), according to Motherboard.
The search engine LeakedSource, which sells hacked data, also claims to have obtained the contents of the data dump, and asks affected users to contact them if they wish to be removed f-rom their list.
Both LeakedSource and Peace claim that there are 167 million accounts in the hacked database, 117 million of those include both emails and encrypted passwords, Motherboard reports.
Security researcher Troy Hunt told Motherboard that he had spoken with some of the users affected by the leak.
I've been verifying a portion of the alleged 167M record LinkedIn data breach. It's *highly* likely this is legit. More soon.
— Troy Hunt (@troyhunt) May 18, 2016
A $5 million lawsuit was filed against Linkedin in the wake of the 2012 hack, blaming the company for its outdated security measures.Things about the LinkedIn breach:
— Troy Hunt (@troyhunt) May 18, 2016
- Dates to 2012
- SHA1 with no salt (I believe it's changed since)
- Weak passwords will be easily cracked