Cyber Crime

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Researchers from Cyber News Team have spotted threat actors offering for sale 600 million LinkedIn profiles scraped from the platform, again.

Original post: https://cybernews.com/news/threat-actors-scrape-600-million-linkedin-profiles-and-are-selling-the-data-online-again/

For the third time in the past four months, LinkedIn seems to have experienced another massive data scrape conducted by a malicious actor. Once again, an archive of data collected from hundreds of millions of LinkedIn user profiles surfaced on a hacker forum, where it’s currently being sold for an undisclosed sum.

This time, the author of the forum post is purportedly selling information gathered from 600 million LinkedIn profiles.

They also claim that the data is new and “better” than that collected during the previous scrapes.

Samples from the archive shared by the author include full names, email addresses, links to the users’ social media accounts, and other data points that users had publicly listed on their LinkedIn profiles.

While not deeply sensitive, the information could still be used by malicious actors to quickly and easily find new targets based on the criminals’ preferred methods of social engineering.

LinkedIn’s refusal to treat malicious scraping as a security problem can potentially allow cybercriminals to gather data on new victims with impunity. The social media platform, however, is of a different opinion on the matter:

“Our teams have investigated a set of alleged LinkedIn data that has been posted for sale. We want to be clear that this is not a data breach and no private LinkedIn member data was exposed,” LinkedIn said in its June 29 statement regarding a previous data scrape, where malicious actors collected data from 700 million profiles.

Even though LinkedIn’s representatives are correct in saying that no private data was exposed, collecting publicly available information on a mass scale can still put users at risk of spam and phishing attacks.

Read more about the April 2021 LinkedIn scrape: Scraped data of 500 million LinkedIn users being sold online

To see if any of your online accounts were exposed in previous security breaches, use our personal data leak checker with a library of 15+ billion breached records.

What’s being sold by the threat actor?

Judging from the samples shared by the author, the archive appears to contain a variety of publicly available professional information gathered from LinkedIn profiles, including:

  • LinkedIn IDs
  • Full names
  • Email addresses
  • Phone numbers
  • LinkedIn profile URLs
  • Links to other social media profiles
  • Genders
  • Birth dates
  • Locations
  • Professional titles and other work-related data

The sample provided by the forum post author contains 632,699 LinkedIn profile entries, which include 154,204 user email addresses.

An example of scraped data from the sample:

Fortunately, it seems that no deeply sensitive information like contents of personal messages, document scans, or credit card details are included in the archive. That being said, even an email address or a phone number can be enough for a persistent cybercriminal to cause damage to their victims.

Scraping is dangerous because it allows criminals to easily find new targets

Even though the data gathered from 600 million LinkedIn profiles was not acquired as a result of a breach, allowing third parties to mass scrape LinkedIn user profiles can result in those users being attacked by malicious actors in a variety of ways.

For example, phishers and spammers often use data acquired from scrapers to find new victims: they can extract scraped public contact details and use them for robocalls, spam lists, and social engineering attacks, whereby phishers and scammers can try to manipulate users into revealing their personal information and banking details. This is why many web applications use scraping mitigation tools that help protect against hostile data collection by bots and threat actors.

Having suffered three massive scraping incidents in the past four months, LinkedIn still does not seem to take malicious scraping seriously. Criminals still appear to be able to gather user-related information virtually unopposed, which makes LinkedIn’s refusal to clamp down on third-party scraping by implementing robust anti-scraping measures that much more perplexing.

What to do if you’ve been affected?

If you suspect that your LinkedIn profile data might have been scraped by the threat actor, we recommend you:

  • Remove your email address and phone number from your public LinkedIn profile to avoid them being scraped by a malicious third party in the future.
  • Change the password of your LinkedIn and email accounts.
  • Enable two-factor authentication (2FA) on all your online accounts.
  • Beware of suspicious messages on social media and connection requests from strangers.
  • Consider using a password manager to create unique strong passwords and store them securely.

In addition, beware of phishing emails and text messages. Again, don’t click on anything suspicious or respond to anyone you don’t know.

About the author: CyberNews Team

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, data scraping)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware…

4 hours ago

Sophos fixed critical vulnerabilities in its Firewall product

Sophos fixed three Sophos Firewall flaws that could lead to SQL injection, privileged SSH access…

17 hours ago

U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust Privileged Remote Access (PRA) and Remote…

1 day ago

Raccoon Infostealer operator sentenced to 60 months in prison

Raccoon Infostealer operator Mark Sokolovsky was sentenced to 60 months in US prison and ordered…

1 day ago

Mirai botnet targets SSR devices, Juniper Networks warns<gwmw style="display:none;"></gwmw>

Juniper Networks warns that a Mirai botnet is targeting SSR devices with default passwords after…

2 days ago

Fortinet warns about Critical flaw in Wireless LAN Manager FortiWLM<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Fortinet warns of a patched FortiWLM vulnerability that could allow admin access and sensitive information…

2 days ago

This website uses cookies.