LinkedIn suffers yet another massive user data ‘breach’: 700 Mn. confirmed records available on the Dark Web

LinkedIn User Data Leak Exposure Breach
Data “Leak”, not “Breach”, is reassuring? Pic credit: Mambembe Arts & Crafts/Flickr/CC BY 2.0

Data of over 700 million LinkedIn users, or about 92 percent of the company’s entire userbase, is now available on the Dark Web. The hacker has even posted a “sample set” of 1 million users for potential buyers to verify.

LinkedIn has about 756 Million users, and data of 700 Million of them are now available for sale on the Dark Web. Independently verified data records confirm the sample includes include phone numbers, physical addresses, geolocation data, and inferred salaries of 92 percent of users.

The majority of LinkedIn users are now part of massive data theft:

A hacker has advertised LinkedIn data, which he claims is of about 700 Million LinkedIn users, is for sale. To back such seemingly ludicrous claims, the hacker has posted a sample of the data that includes 1 million LinkedIn users. Reports confirm the sample contains the following information:

  • Email Addresses
  • Full names
  • Phone numbers
  • Physical addresses
  • Geolocation records
  • LinkedIn username and profile URL
  • Personal and professional experience/background
  • Genders
  • Other social media accounts and usernames

RestorePrivacy has independently verified the same, and claims the user data is authentic and “tied to real users”. It is even more concerning to note the data does appear to be up to date. The analysis includes the sample contains the latest information ranging from 2020 to 2021.

The data does not include passwords. This means hackers cannot compromise or manipulate account information, yet.

However, the data is practically invaluable. LinkedIn users are vulnerable to professional phishing scams. Hence, some cleverly crafted scams could manage to illegally obtain login credentials for LinkedIn and other sites.

LinkedIn apparently did not mend its ways and hackers merely reused tricks that worked before:

LinkedIn, the social media platform for professionals, has suffered a very similar data leak in the recent past. Reports claim the hacker obtained the data by exploiting the company’s API to harvest information that people upload to the site.

This method is called “scraping”. Simply put, there’s no “data breach”, wherein hackers usually compromise security, illegally obtain unauthorized entry, and steal data. Scraping tools, when perfected, trawl the servers and databases, collecting and collating information.

LinkedIn has issued a formal statement, in which it specifically claims that it did not face a data breach.  “While we’re still investigating this issue, our initial analysis indicates that the dataset includes information scraped from LinkedIn as well as information obtained from other sources.”

“This was not a LinkedIn data breach and our investigation has determined that no private LinkedIn member data was exposed. Scraping data from LinkedIn is a violation of our Terms of Service and we are constantly working to ensure our members’ privacy is protected.”

A previous such data leak happened in a very similar manner in April, this year. During the same, hackers obtained user data of over 500 Million users from “multiple sources”.

With such repeated data exposures, several LinkedIn “Premium” subscribers are reportedly considering canceling their subscriptions. A premium package costs $29.99 per month. Incidentally, Microsoft owns LinkedIn.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x

Warning: Undefined variable $posts in /home/thetechherald/public_html/wp-content/themes/generatepress_child/functions.php on line 309

Warning: Trying to access array offset on value of type null in /home/thetechherald/public_html/wp-content/themes/generatepress_child/functions.php on line 309

Warning: Attempt to read property "post_author" on null in /home/thetechherald/public_html/wp-content/themes/generatepress_child/functions.php on line 309