Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

It's currently unclear whether the data is fresh or part of a historic breach

The scraped data of over 500 million LinkedIn profiles has been put up for sale on a popular hacker forum.

The post's author has leaked two million records already as proof of the existence of the much larger data trove, as reported by Cybernews.

The data, which is spread across four files, is said to include full names, email addresses, phone numbers, and information related to their place of work.

So far, no precise figure has been set for the data, although the user has said that interested parties should expect to pay a four-digit sum, likely in bitcoin.

While it has been confirmed that the data was scraped from LinkedIn, it's unclear whether this is a new data breach or if the data has been taken from previous LinkedIn breaches.

A LinkedIn spokesperson told IT Pro: "While we’re still investigating this issue, the posted dataset appears to include publicly viewable information that was scraped from LinkedIn combined with data aggregated from other websites or companies. 

"Scraping our members’ data from LinkedIn violates our terms of service and we are constantly working to protect our members and their data."

LinkedIn hacker forum post
Related Resource

Taking a proactive approach to cyber security

A complete guide to penetration testing

A complete guide to penetration testing - whitepaper from CyberCxDownload now

The full leaked files contain information including LinkedIn IDs, full names, email addresses, phone numbers, genders, links to LinkedIn profiles, and professional titles.

Although there was no evidence of sensitive information like credit card details or legal documents in the sample posted to the forum, the leaked information can still be used for phishing or social engineering attacks.

Earlier this month, it emerged that a hacking group was targeting LinkedIn users with fake job offers to infect them with malware that allowed them to take control of a victim’s computer. The Golden Chicken hacking group spread the malware through spear phishing victims with a malicious .ZIP file that would provide remote access to their device.

The personal data of 533 million Facebook users was also found on a hacking forum this month and was available to download for free. The records, which represent around a fifth of the company’s entire user base, contained full names, birth dates, and the status of a user's relationship.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
Biden looks to shore up the electrical grid’s cyber security
Security

Biden looks to shore up the electrical grid’s cyber security

15 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021