Hacker offers 117 million LinkedIn login details for sale on Darknet
LinkedIn has admitted that the 2012 hack was significantly worse than previously thought since the new data dump emerged.
The company has advised all members to change their passwords as they take steps to contact members whose data has been compromised and invalidate the passwords of affected accounts.
Hackers gained access to the site in 2012 and posted 6.5 million encrypted passwords on a Russian hacker forum, but email addresses were not included in that dump.
The passwords from both releases were encrypted with “no salt,” making them easier to crack.
A salt is a random number that is needed to access encrypted data, along with a password.
The hacker who released the data goes by the name of Peace. He is selling the information on a Darknet marketplace called The Real Deal for 5 bitcoin (around $2,200), according to Motherboard.
The search engine LeakedSource, which sells hacked data, also claims to have obtained the contents of the data dump, and asks affected users to contact them if they wish to be removed from their list.
Both LeakedSource and Peace claim that there are 167 million accounts in the hacked database, 117 million of those include both emails and encrypted passwords, Motherboard reports.
Security researcher Troy Hunt told Motherboard that he had spoken with some of the users affected by the leak.
I've been verifying a portion of the alleged 167M record LinkedIn data breach. It's *highly* likely this is legit. More soon.— Troy Hunt (@troyhunt) May 18, 2016
Things about the LinkedIn breach:— Troy Hunt (@troyhunt) May 18, 2016
- Dates to 2012
- SHA1 with no salt (I believe it's changed since)
- Weak passwords will be easily cracked
A $5 million lawsuit was filed against Linkedin in the wake of the 2012 hack, blaming the company for its outdated security measures.
LinkedIn reminded users in its Wednesday statement that it now salts every password and urged members to use two-factor authentication.