Another 500M accounts scraped: This time LinkedIn and other services

500m accounts scraped

Not long after we learned that more than 500M accounts were scraped, exposing personal data from Facebook users, a report today says the same is true of LinkedIn and unnamed additional services.

Some 2 million records have been put online as proof of the attack …

Cybernews reports.

An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author.

The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information, and more.

The data includes:

However, LinkedIn says that while some of the data came from its service, the 500M records are a mix of this data and additional data obtained from other services.

Members trust LinkedIn with their data, and we take action to protect that trust. We have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn. This was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we’ve been able to review.

Any misuse of our members’ data, such as scraping, violates LinkedIn terms of service. When anyone tries to take member data and use it for purposes LinkedIn and our members haven’t agreed to, we work to stop them and hold them accountable.

Cybernews says that, like the Facebook breach, the data may actually have been obtained some years ago.

The author of the post claims that the data was scraped from LinkedIn. Our investigation team was able to confirm this by looking at the samples provided on the hacker forum. However, it’s unclear whether the threat actor is selling up-to-date LinkedIn profiles, or if the data has been taken or aggregated from a previous breach suffered by LinkedIn or other companies.

This is a reference to a LinkedIn data breach back in 2016.

On May 17, 2016, we became aware that data stolen from LinkedIn in 2012 was being made available online. This was not a new security breach or hack. We took immediate steps to invalidate the passwords of all LinkedIn accounts that we believed might be at risk. These were accounts created prior to the 2012 breach that had not reset their passwords since that breach.

Passwords do not appear to have been compromised. However, you should be extra vigilant of emails purporting to come from LinkedIn contacts.

FTC: We use income earning auto affiliate links. More.


Check out 9to5Mac on YouTube for more Apple news:

Guides

Privacy

Privacy is a growing concern in today's world. Follow along with all our coverage related to privacy, security, and more in our guide.

Security

LinkedIn

About the Author

Ben Lovejoy

Ben Lovejoy is a British technology writer and EU Editor for 9to5Mac. He’s known for his op-eds and diary pieces, exploring his experience of Apple products over time, for a more rounded review. He also writes fiction, with two technothriller novels, a couple of SF shorts and a rom-com!

Ben Lovejoy's favorite gear

NordVPN

Apple Watch Series 3