117m LinkedIn account details for sale

The data is available to buy for just £1500 on the dark web

Hacked data search engine LeakedSource has revealed the usernames and passwords of up to 117m LinkedIn users is up for sale by the hacker that stole the data.

The data is being sold by a hacker going by the name of Peace, for just five bitcoin, which converts into 1500 - a cheap price to pay for so much information.

LeakedSource explained that in total, 167m entries are up for sale on the dark web illegal marketplace, The Real Deal, but 50m of these don't have sensitive information such as passwords."LinkedIn has had an awful record of securing their service, and this appears to be another confirmation that they operate without due care for the valuable information they curate," Simon Crosby, CTO and co-founder at Bromium added. "I recommend that users be very cautious of using the service because attackers will use compromised accounts to launch other attacks. Change your password now."It's thought the data was stolen during a security breach in 2012 when 6.5m encrypted LinkedIn passwords were posted online, but at the time, the extent of the data loss wasn't revealed.

A LinkedIn spokesperson said: "Yesterday, we became aware of an additional set of data that had just been released that claims to be email and hashed password combinations of LinkedIn members from that same theft in 2012. 

"We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords. We have no indication that this is a result of a new security breach."

However, Toni Gidwani, director of analysis at ThreatConnect explained that this may not be enough and the data may have already been used to access the LinkedIn users' other accounts.

"The long lag time between the breach and passwords now appearing for sale suggests the data has already been mined for other nefarious purposes," he said. "LinkedIn, with its rich context of professional networks, is a gold mine for adversaries looking to social engineer targets for future attacks. Which are you more likely to open: an email from a Nigerian prince?  Or a link in an article sent by someone you've worked with for years?

"Four years after the fact, the breached dataset still has some nominal monetary value, which is why it's for sale for only a handful of bitcoin. But the trickier question is figuring out who has been exploiting the breached data for the last four years and to what end."

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

Survey finds web app attacks are up 800% compared to 2019
Security

Survey finds web app attacks are up 800% compared to 2019

23 Nov 2020
Digital Shadows’ context-based security alerts expand sensitive doc management
Security

Digital Shadows’ context-based security alerts expand sensitive doc management

23 Nov 2020
More than half of businesses saw rising fraud levels this year
Security

More than half of businesses saw rising fraud levels this year

23 Nov 2020
Manchester United resists ‘sophisticated’ cyber attack
Security

Manchester United resists ‘sophisticated’ cyber attack

23 Nov 2020

Most Popular

Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020