Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

117M LinkedIn Passwords Leaked

A 2012 password breach continues to haunt the enterprise social network.

By Stephanie Mlot
May 18, 2016
Security Breach

Four years later, LinkedIn is still dealing with the effects of a 2012 data breach.

At the time, hackers reportedly gained access to more than 6 million of the enterprise social network's 161 million users. But LinkedIn has confirmed that an additional set of data was released on Monday.

"We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords," Chief Information Security Officer Cory Scott said in a statement. "We have no indication that this is a result of a new security breach."

In a conversation with Motherboard, the hacker who claims to have pulled off the 2012 hack (and who goes by the name "Peace") said there are 167 million-plus accounts in the database—about 117 million of which include emails and encrypted passwords. Subscription-based hacked-data search engine LeakedSource said the same in a Tuesday blog post.

Based on a sample of nearly 1 million credentials, Motherboard reported that the hacked passwords were encrypted with the SHA-1 algorithm—already outdated by 2012. LinkedIn had "just recently put in place" enhanced security measures like hashing and salting—meant to make it harder for hackers to decipher passcodes—when the breach occurred.

"We take the safety and security of our members' accounts seriously," Scott said today. "For several years, we have hashed and salted every password in our database, and we have offered protection tools such as email challenges and dual factor authentication."

Peace is reportedly selling the stolen account data on the dark Web for five bitcoin (about $2,282).

Days after the 2012 breach, LinkedIn was sued for failing to properly secure its users' data, which was settled last year for $1.25 million.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Stephanie Mlot

Contributor

Stephanie Mlot

B.A. in Journalism & Public Relations with minor in Communications Media from Indiana University of Pennsylvania (IUP)

Reporter at The Frederick News-Post (2008-2012)

Reporter for PCMag and Geek.com (RIP) (2012-present)

Read Stephanie's full bio

Read the latest from Stephanie Mlot