Attacks/Breaches
6/6/2012
11:47 AM
50%
50%

LinkedIn Users: Change Password Now

Attackers appear to have obtained--and may have already decrypted--at least 6.5 million LinkedIn passwords.

All users of the LinkedIn social network should immediately change their password.

Security experts began broadcasting that warning Wednesday after reports emerged that nearly 6.5 million LinkedIn password hashes--encrypted using SHA1, but not salted--had been posted to a Russian hacking forum on Monday, together with a request to help decrypt them.

Hackers have already reported breaking 163,267 of the passwords, reported Norwegian news outlet Dagen IT, which Wednesday broke the news of the LinkedIn password breach.

LinkedIn confirmed that it's investigating the potential password breach. "Our team is currently looking into reports of stolen passwords. Stay tuned for more," read a Wednesday tweet from LinkedIn News.

[ Read about how hackers accessed a Romney Webmail account. See Romney Campaign Investigates Hotmail Account Hack. ]

What should LinkedIn users do? "First change your LinkedIn password. Then prepare for scam emails about Linkedin password changes, linking to phishing sites. Will happen," said Mikko Hypponen, chief research officer at F-Secure, via Twitter.

Security expert Per Thorsheim tweeted that he'd reviewed the uploaded password hashes and recovered at least 300,000 of them. "The number of [occurrences] of 'linkedin' in those passwords leave little doubt about the origin. Change password NOW!" Meanwhile, a post from the Security Ninja website's Twitter feed noted that "after getting the list of @linkedin hashes and hashing my old pwd with no salt there is a match for the hash in the list." Accordingly, it said that it was "best to assume the worst and change your password."

Evidently, LinkedIn didn't salt its passwords--a practice recommended by security experts that involves adding a unique string to each password before encrypting it. Had the passwords been salted, it would have made them more difficult for attackers to reverse the SHA1 password hashes. In fact, attackers may have already decrypted the passwords, and they may also have users' passwords and email addresses. "Although the data which has been released so far does not include associated email addresses, it is reasonable to assume that such information may be in the hands of the criminals," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

The Computer Emergency Response Team of Finland (CERT-FI) Wednesday warned that many more than the 6,458,020 uploaded password hashes are likely to have been obtained by attackers. "Not all LinkedIn passwords have been published, but it is likely that an attacker is in possession of the rest of the passwords," it said.

According to LinkedIn, as of March 31, 2012, it had 161 million members.

CERT-FI also advised anyone who had reused their LinkedIn password on another site to immediately change it there as well, since it will be at risk of being hacked by anyone who downloads and reverses the uploaded LinkedIn password hashes.

More and more organizations are considering development of an in-house threat intelligence program, dedicating staff and other resources to deep inspection and correlation of network and application data and activity. In our Threat Intelligence: What You Really Need to Know report, we examine the drivers for implementing an in-house threat intelligence program, the issues around staffing and costs, and the tools necessary to do the job effectively. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Number 6
50%
50%
Number 6,
User Rank: Apprentice
6/6/2012 | 6:18:22 PM
re: LinkedIn Users: Change Password Now
Nice of LinkedIn to not mention this to their users when they sign on (so far).
GR8Day
50%
50%
GR8Day,
User Rank: Apprentice
6/7/2012 | 3:31:25 PM
re: LinkedIn Users: Change Password Now
I am surprised a social networks who is geared for the professional would not be more security conscious. I am a member and would like to see them take some steps to provide me with additional layers of protection for access to my account verification without unreasonable complexity. It would be great to see them just as some of the other leading companies in their respective verticals giving us the perfect balance between security and user experience by moving to the use of 2FA (two-factor authentication) mobile or other, as a form of a token where the user is asked to telesign into their account by entering a one-time PIN code which is delivered to your phone via SMS or voice. I wish really wish more organizations would start implementing 2FA.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?