“Treasure trove” of 66m records suggests LinkedIn data scraping

Users warned to guard against unsolicited job adverts via email

Binary code graphic to represent vast amounts of data

A publicly-exposed cache of 66 million records has been found in the wild containing employment information such as career history, and skills.

Researchers have stumbled on a "treasure trove" of 66,147,856 unique records across three large databases, including a MongoDB database, that contained a wealth of scraped business-centric information.

The exposed records include full names, personal or professional emails, location details, skills, and work histories; all information that would typically be found on a LinkedIn profile.

Although the entries do not contain any sensitive personal information, such as financial details or passwords, they do contain private information, such as a person's background and their IP address.

Malwarebytes' lead malware intelligence analyst, Christopher Boyd, said that such databases will typically be used to power large-scale phishing campaigns, although there's no way of knowing if the information is being exploited in the wild.

"It could also prove useful to anyone wanting a ready-made marketing list. The big problem is that even if the ones doing the data scraping had no harmful intentions, that may not apply to anybody finding the treasure trove.

"Given how this information was stumbled upon in the first place, there's no real way to know how many bad actors got their hands on it first."

This data-scraping incident is also connected with a host of complaints by many LinkedIn and GitHub users that they have been receiving breach notifications lately, Boyd added. The users affected can also expect to be targeted with phishing attacks alongside a string of fake job offers and "poor quality" job offer spam.

Data scraping, the method which the data was obtained, is considered a grey area legally-speaking, given it does not involve hacking, or breaching an organisation's defences. Rather, the data is very efficiently gathered by threat actors from information that users themselves choose to make publicly available.

But HackenProof, which first discovered the three exposed databases, argues data scraping "without first obtaining the prior individual's written consent" is illegal, especially in light of the European Union's General Data Protection Regulation. But the platform conceded this can vary from case to case depending on how the extracted data is used.

HackenProof also suggested several steps employees and bosses can take to minimise the chances their personal information isn't reaped in such a way in future.

These include only providing the bare minimum data when creating online profiles, using different email addresses for bank accounts versus social media, and assessing whether personal data volunteered may potentially be used in a malicious way.

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

Flexible vs agile working
Business strategy

Flexible vs agile working

17 Sep 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
PayPal dismisses $45 billion Pinterest takeover as "market rumour"
Acquisition

PayPal dismisses $45 billion Pinterest takeover as "market rumour"

25 Oct 2021