LinkedIn logo

Hacker hawking 167m LinkedIn user records

Pro
Image: LinkedIn

18 May 2016

A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.

The announcement was posted on a dark market web site called TheRealDeal by a user who wants 5 bitcoins, or around $2,200 (€1,950), for the data set that supposedly contains user IDs, email addresses and SHA1 password hashes for 167,370,940 users.

According to the sale ad, the dump does not cover LinkedIn’s complete database. Indeed, LinkedIn claims on its web site to have over 433 million registered members.

Troy Hunt, the creator of Have I been pwned?, a web site that lets users check if they were affected by known data breaches, thinks that it’s highly likely for the leak to be legitimate. He had access to around 1 million records from the data set.

“I’ve seen a subset of the data and verified that it’s legit,” Hunt said via e-mail.

LinkedIn suffered a data breach back in 2012, which resulted in 6.5 million user records and password hashes being posted online. It is highly possible that the 2012 breach was actually larger than previously thought and that the rest of the stolen data is surfacing now.

Attempts to contact the seller failed, but the administrators of LeakedSource, a data leak indexing website, claim to also have a copy of the data set and they believe that the records do originate from the 2012 LinkedIn breach.

“Passwords were stored in SHA1 with no salting,” the LeakedSource administrators said in a blog post. “This is not what Internet standards propose. Only 117 million accounts have passwords and we suspect the remaining users registered using Facebook or some similarity.”

Best security practices call for passwords to be stored in hashed form inside databases. Hashing is a one-way operation that generates unique, verifiable cryptographic representations of a string that are called hashes.

Hashing is useful for validating passwords, because running a password through the same hashing process should always result in the same hash, allowing its comparison with one previously stored in a database.

Converting a hash back into the original password should be impossible, which is why it’s safer to store hashes instead of plain text passwords. However, there are old hashing functions, such as MD5 and SHA1, that are vulnerable to various cracking techniques and should no longer be used.

When the 6.5 million LinkedIn password hashes were leaked in 2012, hackers managed to crack over 60% of them. The same thing is likely true for the new 117 million hashes, so they cannot be considered safe.

Worse still, it is very likely that many LinkedIn users that were affected by this leak have not changed their passwords since 2012. Hunt was able to verify that for at least one HIBP subscriber whose e-mail address and password hash was in the new data set that is now up for sale.

Many people affected by this breach are also likely to have reused their passwords in multiple places on the Web, Hunt said via e-mail.

A statement from LinkedIn released today said: “We take the safety and security of our members’ accounts seriously. For several years, we have hashed and salted every password in our database, and we have offered protection tools such as email challenges and dual factor authentication. We encourage our members to visit our safety centre to learn about enabling two-step verification, and to use strong passwords in order to keep their accounts as safe as possible.”

IDG News Service

Read More:


Back to Top ↑

TechCentral.ie