A new massive LinkedIn breach made the headlines, a database containing data of 700M users, more than 92% of the total 756M users, is available for sale on forums on the dark web.
The exposed records include email addresses full names, phone numbers, physical addresses, geolocation records, LinkedIn username and profile URL, personal and professional experience/background, genders, and other social media accounts and usernames. Passwords are not included in the archive.
The threat actor that is offering for sale the data shared a sample of 1M records as proof of the authenticity of the archive. According to media that analyzed the data were able to confirm that they are genuine and up-to-date.
According to the RestorePrivacy website, the threat actor abused the official LinkedIn API to download the data
“We reached out directly to the user who is posting the data up for sale on the hacking forum. He claims the data was obtained by exploiting the LinkedIn API to harvest information that people upload to the site.” reported RestorePrivacy.
Data available for sale exposes 700+ million people at risk of cybercriminal activities, including identity theft, phishing and social engineering attacks, and account hijacking.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, LinkedIn)
[adrotate banner=”5″]
[adrotate banner=”13″]
The exploitation of the recently disclosed ‘won’t fix’ issue CVE-2024-10914 in legacy D-Link NAS devices…
China-linked threat actors breached U.S. broadband providers and gained access to private communications of a…
Bitdefender released a decryptor for the ShrinkLocker ransomware, which modifies BitLocker configurations to encrypt a…
China's Volt Typhoon botnet has re-emerged, using the same core infrastructure and techniques, according to…
Zoom addressed six flaws, including two high-severity issues that could allow remote attackers to escalate…
Microsoft Patch Tuesday security updates for November 2024 addressed 89 vulnerabilities, including two actively exploited…
This website uses cookies.