Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof


Updated on 07/04: We updated our personal data leak checker database with more than 780,000 email addresses associated with this leak. Use it to find out if your LinkedIn profile has been scraped by the threat actors.

Days after a massive Facebook data leak made the headlines, it seems like we’re in for another one, this time involving LinkedIn.

An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author.

ADVERTISEMENT

The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information, and more.

To see if your email address has been exposed in this data leak or other security breaches, use our personal data leak checker with a library of 15+ billion breached records.

While users on the hacker forum can view the leaked samples for about $2 worth of forum credits, the threat actor appears to be auctioning the much-larger 500 million user database for at least a 4-digit sum, presumably in bitcoin.

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof
We updated our leak checker database with more than 780,000 email addresses associated with this leak...

The author of the post claims that the data was scraped from LinkedIn. Our investigation team was able to confirm this by looking at the samples provided on the hacker forum. However, it’s unclear whether the threat actor is selling up-to-date LinkedIn profiles, or if the data has been taken or aggregated from a previous breach suffered by LinkedIn or other companies.

Updated on 09/04: A statement from LinkedIn appears to confirm the latter: the company states that the data for sale was not acquired as a result of a data breach, and "is actually an aggregation of data from a number of websites and companies."

"This was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we’ve been able to review."

LinkedIn
ADVERTISEMENT

LinkedIn facing a probe from Italy's privacy watchdog

Following “the dissemination of user data, including IDs, full names, email addresses, telephone numbers” by the threat actor, Italy's privacy watchdog began an investigation into the incident on Thursday.

The Italian authority said that the country has one of the highest LinkedIn subscriber counts among European states and called on affected users to “pay particular attention to any anomalies” related to their phone number and their account.

A new collection with 327M more LinkedIn profiles appears on hacker forum

Updated on 10/04: It seems that other threat actors are looking to piggyback on the leak. On Friday, a new collection of LinkedIn databases has been put for sale on the same hacker forum by another user - for $7,000 worth of bitcoin.

The new author claims to be in possession of both the original 500-million database, as well as six additional archives that allegedly include 327 million scraped LinkedIn profiles:

If true, this would put the overall number of scraped profiles at 827 million, exceeding LinkedIn's actual user base of 740+ million by more than 10%. This means that some, if not most, of the new data sold by the threat actor might be either duplicate or outdated.

What was leaked?

Based on the samples we saw from the leaked files, they appear to contain a variety of mostly professional information from LinkedIn profiles, including:

ADVERTISEMENT
  • LinkedIn IDs
  • Full names
  • Email addresses
  • Phone numbers
  • Genders
  • Links to LinkedIn profiles
  • Links to other social media profiles
  • Professional titles and other work-related data

An example of leaked data:

What’s the impact of the leak?

The data from the leaked files can be used by threat actors against LinkedIn users in multiple ways by:

  • Carrying out targeted phishing attacks.
  • Spamming 500 million emails and phone numbers.
  • Brute-forcing the passwords of LinkedIn profiles and email addresses.

The leaked files appear to only contain LinkedIn profile information - we did not find any deeply sensitive data like credit card details or legal documents in the sample posted by the threat actor. With that said, even an email address can be enough for a competent cybercriminal to cause real damage.

Particularly determined attackers can combine information found in the leaked files with other data breaches in order to create detailed profiles of their potential victims. With such information in hand, they can stage much more convincing phishing and social engineering attacks or even commit identity theft against the people whose information has been exposed on the hacker forum.

Next steps

ADVERTISEMENT

If you suspect that your LinkedIn profile data might have been scraped by threat actors, we recommend you:

  • Use our personal data leak checker to find out if your LinkedIn data has been leaked by the threat actor.
  • Beware of suspicious LinkedIn messages and connection requests from strangers.
  • Change the password of your LinkedIn and email accounts.
  • Consider using a password manager to create strong passwords and store them securely.
  • Enable two-factor authentication (2FA) on all your online accounts.
  • Get your personal data removed from various databases with reliable services like Incogni.

Also, watch out for potential phishing emails and text messages. Again, don’t click on anything suspicious or respond to anyone you don’t know.

  • Protect your online activities with a VPN. Check out our page for NordVPN coupons – there might be a nice deal for you there.
  • Store passwords securely with a password manager. We have a page with password manager coupon codes that lists all the best deals.

Build your secure personal and business online presence


ADVERTISEMENT

Comments

NJN
prefix 3 years ago
This is not leakage. The hacker just scraped Linkedin, if you could notice the “nulls”. I do this sometimes as a social media manager. To target my client’s followers, groups, and pages more consistently, I scrape LinkedIn. Showing in the example above is the same data I could get and LinkedIn could give. They are from “Contact Details” that the user wants other LinkedIn people to see.
Jocasta
prefix 3 years ago
It says we have a breach from a LinkedIn account. Nobody in this household has a LinkedIn account. This must be fake.
Cinecal
prefix 3 years ago
LinkedIn is the sheep pen for sheeple. It’s conformity, transparency, and desperation. I want to see that network crumble and burn. It’s a forum for modern gangster syndicates, I mean legal corporate empires to pat themselves on the back and announce their self serving accomplishments. It’s enough to make you puke when you scroll through it.
Alfredo
prefix 3 years ago
I wander what your occupation is…
Noah N
prefix 3 years ago
One of the most brilliant and succinct comments in the history of article comments and the perfect handle is simply a complimentary bonus.
Pavol Just
prefix 3 years ago
Im laughing out loud this is a top comment
Valentin
prefix 3 years ago
It is funny that they have the passwords as well, they already tried to demand payment from me, by showing me my previous(as in 6 years old) password. This points out, that they haven’t encrypted the passwords, but keep them in plaintext. Also all my colleagues from first and second line security positions have reported the same thing.
Krishna
prefix 3 years ago
which website are selling data?
Valéry S.
prefix 3 years ago
The big 5 are selling everything they know about you to gov and other companies. So, they need a way to be exonerated from potential charges.

It is so weird that no one seems to complaint against them, and no one seems to open an investigation.
It could be interesting to see who DO NOT appear in the DB…
Next leak to come : your bank account including your bank statements.

Thank to Snowden to warn us since the beginning.
Leave a Reply

Your email address will not be published. Required fields are markedmarked