LinkedIn and the Dark Web Have a History to Share

117 Million LinkedIn Account Details from the 2012 Theft Go on Sale

The web seems to be getting darker by the day as we come across hackers and breached information being sold on the internet almost every day. LinkedIn recently suffered another setback when the company found out that the 2012 breach was far worse than they had figured. The same hacker who had taken responsibility for the disclosure of several passwords in 2012 claims to have the details of 117 million LinkedIn users.

The hacker calls himself ‘Peace’ and he is using the dark web marketplace known as The Real Deal, for 5 Bitcoin which is approximately $2,200. The fresh LinkedIn credentials were posted earlier this week by the dealer who claims to have the emails and hashed password combinations of LinkedIn users from the same data theft which happened in 2012.

For the unenlightened, in 2012, a massive hue and cry broke out among LinkedIn users when they realized that millions of accounts were breached when the details were posted online. A file which contained 6.5 million encrypted LinkedIn passwords were posted on an online Russian forum.

At that time, the company immediately responded by including a mandatory password reset for the accounts that it thought were breached. In addition to this, all LinkedIn members were advised to change the password to avoid unauthorized access.

If LinkedIn says that it was not aware of the exact number of accounts or it did not know which accounts were breached, then it would have been wise for the company to use a forced password reset for all its users to ensure security of the accounts.

After the 2012 data breach, LinkedIn introduced ‘salting’ which is a method that is used to secure the passwords by adding a few random characters which vary for every user. Salting is done before the passwords are hashed and helps prevent hackers from getting information easily.

  Related Posts