Half A Billion LinkedIn Members Found For Sale

Only a few days after discovery of a massive dump of Facebook user datathere has been a second enormous data theft, this time involving LinkedIn. 
 
An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum. IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users. 
 
The data leak was posted to a forum popular with hackers by a user asking for a "four-digit $$$$ minimum price" for access to the full database of stolen account information.
 
To prove the legitimacy of the info, the leaker included two million records as a sample that users on the form can view for $2 worth of forum-specific credits. CyberNews researchers were able to confirm that the data contained in the sample was legitimate, but added that, "It's unclear whether the threat actor is selling up-to-date LinkedIn profiles, or if the data has been taken or aggregated from a previous breach suffered by LinkedIn or other companies." Included in the leaked data was "a variety of mostly professional information," including LinkedIn IDs, full names, email addresses, phone numbers, user gender, links to LinkedIn profiles, links to other connected social media profiles, professional titles and other work-related data. 
 
The leaked data doesn't appear to contain any credit card, other financial details or legal documents that could be used for fraud, although the lack of financial or identification documentation doesn't mean the leaked data isn't dangerous as a determined attacker can combine information found in the leaked files with other data breaches in order to create detailed profiles of their potential victims. "With such information in hand, they can stage much more convincing phishing and social engineering attacks or even commit identity theft against the people whose information has been exposed on the hacker forum," CyberNews said. 
 
LinkedIn says it has nearly 740m users worldwide and if the leaker selling this batch of stolen data is telling the truth, then almost anyone with a LinkedIn account could be among the 500 million leaked records. 
 
LinkedIn users should take precautions to protect their accounts and their personal data by:   
 
  • Changing LinkedIn account passwords and email account passwords associated with LinkedIn profiles.
  • Being wary of LinkedIn messages and connection requests from unknown people.
  • Learning to identify phishing emails and text messages.
  • Never opening links to websites from an email, and instead navigating to a site manually and logging in there. 
  • Installing strong anti-phishing and anti-malware software. 
 
In addition to taking proper precautions with your security, it's also a good idea to subscribe to a website like Have I Been Pwned, which will notify you if your email address is found in a data breach that it has scanned and added to its master database of compromised accounts.  If your information appears in a Have I Been Pwned search, it's important to take action immediately using the above security tips.
 
LinkedIn:      Techrepublic:        CyberNews:       HaveIBeenPwnd:      Inspired eLearning:     Image: Unsplash
 
You Might Also Read: 
 
LinkedIn Used As The Vehicle For A Global Scam:
 
« FatFace Pays $2million Ransom To Cyber Criminals
Credentials Phishing Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.

Aprio

Aprio

Aprio is a premier business advisory and accounting firm. We deliver advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth.