117m LinkedIn account details for sale

The data is available to buy for just £1500 on the dark web

Hacked data search engine LeakedSource has revealed the usernames and passwords of up to 117m LinkedIn users is up for sale by the hacker that stole the data.

The data is being sold by a hacker going by the name of Peace, for just five bitcoin, which converts into 1500 - a cheap price to pay for so much information.

LeakedSource explained that in total, 167m entries are up for sale on the dark web illegal marketplace, The Real Deal, but 50m of these don't have sensitive information such as passwords."LinkedIn has had an awful record of securing their service, and this appears to be another confirmation that they operate without due care for the valuable information they curate," Simon Crosby, CTO and co-founder at Bromium added. "I recommend that users be very cautious of using the service because attackers will use compromised accounts to launch other attacks. Change your password now."It's thought the data was stolen during a security breach in 2012 when 6.5m encrypted LinkedIn passwords were posted online, but at the time, the extent of the data loss wasn't revealed.

A LinkedIn spokesperson said: "Yesterday, we became aware of an additional set of data that had just been released that claims to be email and hashed password combinations of LinkedIn members from that same theft in 2012. 

"We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords. We have no indication that this is a result of a new security breach."

However, Toni Gidwani, director of analysis at ThreatConnect explained that this may not be enough and the data may have already been used to access the LinkedIn users' other accounts.

"The long lag time between the breach and passwords now appearing for sale suggests the data has already been mined for other nefarious purposes," he said. "LinkedIn, with its rich context of professional networks, is a gold mine for adversaries looking to social engineer targets for future attacks. Which are you more likely to open: an email from a Nigerian prince?  Or a link in an article sent by someone you've worked with for years?

"Four years after the fact, the breached dataset still has some nominal monetary value, which is why it's for sale for only a handful of bitcoin. But the trickier question is figuring out who has been exploiting the breached data for the last four years and to what end."

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022