Linkedin security breach. Officials confessed to knowing about the actual count of stolen login credentials. Hackers sold this information in the black market.
Linkedin advised their users to change their passwords as soon as possible. Linkedin is using two-layer authentication. When a user logs in from a new computer will ask for a text message delivered to your mobile.
In 2012, LinkedIn became the victim of an unauthorized access and disclosure of some members’ passwords. At that time, their immediate response included a mandatory password reset for all accounts. unauthorized disclosure security compromised their security. Linkedin advised all members to change their passwords as a matter of best practice.
“Yesterday, we became aware of an extra set of data that had just been released. It claims to be email and hashed password combinations of more than 100 million LinkedIn members from that same theft in 2012.” wrote Cory Scott, in a post on the company’s blog.
“We are taking immediate steps to invalidate the passwords of the accounts changed. We will contact those members to reset their passwords. We have no sign that this is as a result of a new security breach.”
LinkedIn spokesman Hani Durzy said the company has obtained a copy of the 117 million record database, and that LinkedIn believes it to be real.
“We believe it is from the 2012 breach,”. Durzy said in an email. He declined to answer questions about why LinkedIn chose again to force a reset for only some users. “How many of those 117m are active and currently under investigation.”
The 117 million figure makes sense. LinkedIn claims to have more than 400 million users. But reports suggest only about 25 percent of those accounts are active monthly.
LeakedSource, a paid hacked data search engine, also claims to get the stolen data.
According to Motherboard and a member of LeakedSource said “there exist 167 million accounts in the hacked database. About 117 million of these have email and password combinations.