Claims LinkedIn passwords stolen in old hack

Powered by SC Magazine
 

Users claim old passwords found in cache.

The hack in which scores of passwords were stolen from Linkedin and eHarmony may have been done last year.

Users on the forum insidepro – to which the encrypted stolen passwords were posted – told SC Magazine they found their old LinkedIn passwords in the encrypted cache that were obsolete for between six and nine months.

Those users had regularly updated their passwords, placing the hack in about a three month period from around January based on their claims.

Others claimed through inside knowledge that the hack was made around the start of the year through SQL injection on the LinkedIn web site. 

But LinkedIn refused to verify or refute the claims.

“Due to the ongoing investigation, we aren't disclosing the specific details and data related to what we found,” communications manager Deepa Sapatnekar said in a statement.

“The point is we were quickly able to confirm that these were in fact stolen LinkedIn passwords.”

The orginal uploader of the affected password cache, dwdm, did not respond to requests for comment.

Compromised passwords that appeared in the swiped cache were not tied to LinkedIn accounts and so each combination may have been used by multiple users.

LinkedIn was indeed quick to comment when news of the hack broke last week and it has now reset all affected passwords.

About 5.8 million passwords from LinkedIn and eHarmony were posted to insidepro on 3 June. The credentials were stolen before Linkedin had a chance to implement stronger security measures, including salting.

The passwords were encrypted with the SHA-1 hash function and were unsalted and therefore easier to crack with rainbow tables.

Sapatnekar said updates would be released via LinkedIn’s Twitter account and blog.

Were your LinkedIn or eHarmony passwords stolen? Were they new or outdated? Let us know in the comments below.

Copyright © SC Magazine, Australia


Claims LinkedIn passwords stolen in old hack
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote