Hackers Now Offering Over 100 million LinkedIn login details for sale

If you have a Linkedin account, just change your password as the company has advised all members to change their passwords as they take steps to contact members whose data has been compromised and invalidate the passwords of affected accounts. linkedin-data-breach-hack

Hackers gained access to the site in 2012 and posted 6.5 million encrypted passwords on a Russian hacker forum, but email addresses were not included in that dump.The passwords from both releases were encrypted with “no salt,” making them easier to crack.A salt is a random number that is needed to access encrypted data, along with a password. The hacker who released the data goes by the name of Peace. He is selling the information on a Darknet marketplace called The Real Deal for 5 bitcoin (around $2,200), according to Motherboard.

The search engine LeakedSource, which sells hacked data, also claims to have obtained the contents of the data dump, and asks affected users to contact them if they wish to be removed from their list.

ALSO READ: Netflix Unveils Fast.com Internet Speed Test

Both LeakedSource and Peace claim that there are 167 million accounts in the hacked database, 117 million of those include both emails and encrypted password Security researcher Troy Hunt told Motherboard that he had spoken with some of the users affected by the leak.A $5 million lawsuit was filed against Linkedin in the wake of the 2012 hack, blaming the company for its outdated security measures.
LinkedIn reminded users in its Wednesday statement that it now salts every password and urged members to use two-factor authentication.

Previous ArticleNext Article
Chukwuyem Ogala is a content writer at Edliner. A multifaceted personality with a degree in Economics. He has a strong passion for Rap music and sports. A big fan of the NBA, likes Rafael Nadal and has a crush on Serena Williams. Chuks just strives to be better and wants to be heard globally.

Leave a Reply

Your email address will not be published. Required fields are marked *