International Shia News Agency
General Articles

Linkedin login details on sale by hacer on Darknet

SHAFAQNA- Email addresses and passwords for over 100 million LinkedIn members have been put up for sale on the Darknet by the same hacker who stole the data from the site in 2012.

LinkedIn has admitted that the 2012 hack was significantly worse than previously thought since the new data dump emerged.

An update on protecting our members: http://bit.ly/1TfsqEz 
Photo published for Protecting Our Members The company has advised all members to change their passwords as they take steps to contact members whose data has been compromised and invalidate the passwords of affected accounts.

Hackers gained access to the site in 2012 and posted 6.5 million encrypted passwords on a Russian hacker forum, but email addresses were not included in that dump.

The passwords from both releases were encrypted with “no salt,” making them easier to crack.

A salt is a random number that is needed to access encrypted data, along with a password.

The hacker who released the data goes by the name of Peace. He is selling the information on a Darknet marketplace called The Real Deal for 5 bitcoin (around $2,200), according to Motherboard.

The search engine LeakedSource, which sells hacked data, also claims to have obtained the contents of the data dump, and asks affected users to contact them if they wish to be removed from their list.

Both LeakedSource and Peace claim that there are 167 million accounts in the hacked database, 117 million of those include both emails and encrypted passwords, Motherboard reports.

Security researcher Troy Hunt told Motherboard that he had spoken with some of the users affected by the leak.

I’ve been verifying a portion of the alleged 167M record LinkedIn data breach. It’s *highly* likely this is legit. More soon.

Things about the LinkedIn breach:
– Dates to 2012
– SHA1 with no salt (I believe it’s changed since)
– Weak passwords will be easily cracked

A $5 million lawsuit was filed against Linkedin in the wake of the 2012 hack, blaming the company for its outdated security measures.

LinkedIn reminded users in its Wednesday statement that it now salts every password and urged members to use two-factor authentication.

Leave a Comment