A hacker is selling 167 million LinkedIn user records

The data includes hashed passwords for 117 million accounts and likely dates back to 2012

A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.

The announcement was posted on a dark market website called TheRealDeal by a user who wants 5 bitcoins, or around $2,200, for the data set that supposedly contains user IDs, email addresses and SHA1 password hashes for 167,370,940 users.

According to the sale ad, the dump does not cover LinkedIn's complete database. Indeed, LinkedIn claims on its website to have over 433 million registered members.

Troy Hunt, the creator of Have I been pwned?, a website that lets users check if they were affected by known data breaches, thinks that it's highly likely for the leak to be legitimate. He had access to around 1 million records from the data set.

"I've seen a subset of the data and verified that it's legit," Hunt said via email.

linkedin leak sale data breach Lucian Constantin

A hacker is selling 167 million stolen LinkedIn account records on a dark market website.

LinkedIn suffered a data breach back in 2012, which resulted in 6.5 million user records and password hashes being posted online. It's highly possible that the 2012 breach was actually larger than previously thought and that the rest of the stolen data is surfacing now.

LinkedIn did not immediately respond to a request for comment.

Attempts to contact the seller failed, but the administrators of LeakedSource, a data leak indexing website, claim to also have a copy of the data set and they believe that the records do originate from the 2012 LinkedIn breach.

"Passwords were stored in SHA1 with no salting," the LeakedSource administrators said in a blog post. "This is not what internet standards propose. Only 117m accounts have passwords and we suspect the remaining users registered using FaceBook or some similarity."

Best security practices call for passwords to be stored in hashed form inside databases. Hashing is a one-way operation that generates unique, verifiable cryptographic representations of a string that are called hashes.

Hashing is useful for validating passwords, because running a password through the same hashing process should always result in the same hash, allowing its comparison with one previously stored in a database.

Converting a hash back into the original password should be impossible, which is why it's safer to store hashes instead of plain text passwords. However, there are old hashing functions, such as MD5 and SHA1, that are vulnerable to various cracking techniques and should no longer be used.

When the 6.5 million LinkedIn password hashes were leaked in 2012, hackers managed to crack over 60 percent of them. The same thing is likely true for the new 117 million hashes, so they cannot be considered safe.

Worse still, it's very likely that many LinkedIn users that were affected by this leak haven't changed their passwords since 2012. Hunt was able to verify that for at least one HIBP subscriber whose email address and password hash was in the new data set that is now up for sale.

Many people affected by this breach are also likely to have reused their passwords in multiple places on the Web, Hunt said via email.

LinkedIn users who haven't changed their passwords in a long time, are advised to do so as soon as possible. Turning on LinkedIn's two-step verification is also recommended. If the LinkedIn password has been used on other websites, it should be changed there as well.

Join the PC World newsletter!

Error: Please check your email address.

Tags securityhacking

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?