117m LinkedIn account details for sale

The data is available to buy for just £1500 on the dark web

Hacked data search engine LeakedSource has revealed the usernames and passwords of up to 117m LinkedIn users is up for sale by the hacker that stole the data.

The data is being sold by a hacker going by the name of Peace, for just five bitcoin, which converts into 1500 - a cheap price to pay for so much information.

LeakedSource explained that in total, 167m entries are up for sale on the dark web illegal marketplace, The Real Deal, but 50m of these don't have sensitive information such as passwords."LinkedIn has had an awful record of securing their service, and this appears to be another confirmation that they operate without due care for the valuable information they curate," Simon Crosby, CTO and co-founder at Bromium added. "I recommend that users be very cautious of using the service because attackers will use compromised accounts to launch other attacks. Change your password now."It's thought the data was stolen during a security breach in 2012 when 6.5m encrypted LinkedIn passwords were posted online, but at the time, the extent of the data loss wasn't revealed.

A LinkedIn spokesperson said: "Yesterday, we became aware of an additional set of data that had just been released that claims to be email and hashed password combinations of LinkedIn members from that same theft in 2012. 

Advertisement - Article continues below

"We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords. We have no indication that this is a result of a new security breach."

However, Toni Gidwani, director of analysis at ThreatConnect explained that this may not be enough and the data may have already been used to access the LinkedIn users' other accounts.

"The long lag time between the breach and passwords now appearing for sale suggests the data has already been mined for other nefarious purposes," he said. "LinkedIn, with its rich context of professional networks, is a gold mine for adversaries looking to social engineer targets for future attacks. Which are you more likely to open: an email from a Nigerian prince?  Or a link in an article sent by someone you've worked with for years?

"Four years after the fact, the breached dataset still has some nominal monetary value, which is why it's for sale for only a handful of bitcoin. But the trickier question is figuring out who has been exploiting the breached data for the last four years and to what end."

Related Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Business strategy

The pros and cons of net neutrality

4 Nov 2019
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019