LinkedIn passwords compromised.Social network poisoning & other risks

It’s happened, today has been diffused the news that users’ passwords of the most famous business social network LinkedIn have been stolen and leaked on Internet. The company, through it blog, has confirmed the event declaring that more than six million passwords were compromised. Following the message published

We want to provide you with an update on this morning’s reports of stolen passwords. We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation and here is what we are pursuing as far as next steps for the compromised accounts:

  1. Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid.
  2. These members will also receive an email from LinkedIn with instructions on how to reset their passwords. There will not be any links in these emails. For security reasons, you should never change your password on any website by following a link in an email.
  3. These affected members will receive a second email from our Customer Support team providing a bit more context on this situation and why they are being asked to change their passwords.

The company also informed the clients that is currently investigating on the data breach doesn’t giving more information on the exact number of exposed accounts. LinkedIn is considered a mine of information related to business and government personnel that include a huge quantity of confidential data on more than 160 million members.

The data breach has been made public when a user has posted on a Russian forum, specializes in hash cracking, a message that claims that he has hacked and uploaded almost 6.5 million LinkedIn passwords, according to The Verge.

 

On Imperva Data security Blog have been published some interesting hypothesis that let us conclude that the real dimension of the data breach is bigger. The experts of Imperva noted that the file leaked doesn’t contains what they define “easy” passwords such as “123456” that are traditionally the most used. Maybe the hacker has only published the more complicated passwords. Another factor that induce to believe that the number of the stolen passwords is bigger is that passwords are typically listed only once, the list in fact doesn’t reveal how many times a password was used by the members. A single entry in this list can be used by more than one account.

On twitter many users are reporting in these hours that they have found the hash of their LinkedIn passwords on the list published on internet, meanwhile the company is informing the users that it is analyzing the data publishing in order to advise its customers. The digest for the LinkedIn passwords is calculated using the SHA-1 algorithm, despite is considered secure, it is relative simple to discover weakness passwords.

To avoid any kind of problem is suggested to immediate change the passwords s a precaution especially if they are shared among different internet services and common to other account on other platforms.

The hack related to LinkedIn is considerable really serious due the nature of the popular social network, mainly business oriented. LinkedIn members share information about their professions and assignments in private business and also in governments. This characteristic make the social network different from the other ones such as Facebook, exposing sensible information on the business or career relationships of the members.

Accessing to a LinkedIn account is possible to acquire many information on the victims, its relations and it’s participation to events and discussions related to specific professional areas. It’s clear that the information could represent the basis for other type of attacks and for cyber espionage. Just last month a serious vulnerability was been found in the authentication process of the popular network LinkedIN, the news published on the Spanish blog of the security expert Fernando A. Lagos Berardi. The article published reported a vulnerability in LinkedIn that allowed obtaining user’s password.

Analyzing the relationships of a victims it is possible to discover its actual engage, trace its past experiences and specialization, possibly utilizing its profile to enforce the reputation of fake accounts and members poisoning the network of professional.

Starting from the assumption that Internet and in particular the social network lacks a coherent and safe management of digital identity, last year I introduced the concept of social network poisoning as the effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. The application of this kind of attack on large-scale could lead to the collapse of Social Networking and could expose member to the risks of cyber espionage and other cyber crime such as identity theft.

In the same way as the ”route poisoning” (affecting the telecommunications network), the “poisoning action” are conducted with the aim to pollute the contents of this social network profiles typically introducing artifacts and relationships exist between them and real ones thus making the information unreliable. The result is the consequent failure of the chain of trust which is based on all social networks, in order not to allow search engines specifically developed to retrieve information of any kind relating to a particular profile.

The main tools currently poisoning hypothesize new and viable in a future scenario are:
Replacement of identity, or the ability to impersonate another user to the wide variety of purposes intelligence social engineering.

  • Simulation of identity, creating a false profile, which does not correspond to any existing person, for malicious purposes or simply to remain anonymous.
  • Fuzzing profile, the voluntary introduction of elements false and / or non-matching to your profile to deceive intelligence systems, to prevent OSINT activities or other forms of personal gain.
  • Fuzzing social graph, the association intended to groups and individuals that have nothing to do with their interests and relations with the intention of introducing ”noise” in their social graph.
  • Building of personal /social bots , creating a large number of fake profiles (e.g. millions of fake profiles) managed by machines, able to interact with real users in a way likely, thus changing the ”sentiment” and ”conversation ”large-scale as well as altering all the social graph and to preclude meaningful correlations on the data.
  • black curation, the use of real users ”holes” or fictitious to speak on topics of which you want to change the meaning, or to create new one ad-hoc, in analogy to the black SEO (search engine optimization) already use on search engines.

During this transition is suggested to consider carefully which profiles to add to our network for the possibility that some of them have been already compromised giving the possibility to cyber criminals or spies to access to information shared in the profile.

Social network such as LinkedIn are also used by a lot of government officials all over the world, don’t forget for example the attacks made months ago against NATO’S most senior commander using  the Facebook platform. The intelligence and the West industry are still too vulnerable to all kinds of attacks, so it is absolutely necessary to define cyber strategies to deal with incidents like those described.

In the last year it has been observed an impressive growth of state-sponsored attacks aimed at stealing information to give them an economic, political and military advantage.

Many times we have spoken of Advanced persistent threat (APT) usually refers to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly used to refer to cyber threats such as cyber espionage, but applies equally to other threats such as that of traditional espionage or engineering attack.

Another real risk is the possibility that in these hours is launched a massive phishing campaign to invite the LinkedIn users to change their passwords, might provide additional information to criminal. Typically, such campaigns may be accompanied by strategic dissemination of malware for many different purposes, so the user receives an email with a link (although this hypothesis has been excluded by LI) which redirects him to the infected web site.

I conclude by reiterating that similar events may have serious impacts if not properly managed, at this stage the awareness of the threat and timeliness of information are crucial.

Following the detailed instruction for the change of the password:

Changing Your Password:

  • Never change your password by following a link in an email, since those links might be compromised and redirect you to the wrong place.
  • You can change your password from the LinkedIn Settings page.
  • If you don’t remember your password, you can get password help by clicking on the Forgot password? link on the Sign in page.
  • In order for passwords to be effective, you should aim to update your online account passwords every few months or at least once a quarter.

 

Pierluigi Paganini

References

http://it.wikipedia.org/wiki/Social_Network_Poisoning

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

59 minutes ago

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

8 hours ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

12 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

13 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

17 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

1 day ago