All You Need to Know About LinkedIn Data Breach

  • By David Lukic
  • Published: Jan 29, 2021
  • Last Updated: Mar 18, 2022

 Some things come to light only after the passage of time. The LinkedIn data breach is a good example. Initially thought to have only affected 6.5 million users, in 2016, new information came to light revealing that virtually all 170 million LinkedIn members’ account logins were stolen. The new information was disclosed when a hacker named “Peace” offered the stolen user accounts on the dark web for about $2,300 (5 bitcoins). They advertised the loot on the “Real Deal” forum. A copy of the data was obtained from the Russians by LeakedSource and they confirmed with a few users that the LinkedIn username and hashed (SHA1) passwords were correct, and from the initial 2012 LinkedIn data breach. Only 117 of the accounts found in the data had passwords, so the other uses must have connected via Facebook or another login. The hackers claimed to have unencrypted all of the passwords.

linkedin data breach

When Was the LinkedIn Data Breach?

The actual Linkedin breach took place in June of 2012. However, in May of 2016, news broke again of the data breach because the severity came into question, and the collection of data was found on sale on the dark web. LinkedIn has never confirmed the actual number of affected users, but cyber experts who have examined the stolen data say it is legitimate.

How to Check If You Are Victim of LinkedIn Breach

LinkedIn reset all passwords for all affected accounts at the time. However, since the breach has since been thought to have affected all user accounts, you were probably included. You can contact support at LinkedIn if you have any questions about your specific user account at safety@linkedin.com.

LinkedIn Hacked? Here’s What to Do

Unfortunately, unless you connected to LinkedIn through a third-party login like Facebook, you were included in the data breach. The LinkedIn data breach included email addresses and passwords only. However, that is enough to get into your account. The first thing you need to do is change your LinkedIn password if you haven’t already.

Then set up two-factor authentication for your LinkedIn account to include a second layer of protection for your login. Additionally, watch out for phishing emails or scams that are designed to look like they came from LinkedIn but sound “off.” Additional steps to take are:

  • If you used your LinkedIn password anywhere else, change it now to a complex new one.
  • Regularly review your bank and credit card statements looking for fraud.
  • Sign up for credit monitoring with a company like IDStrong.com so you can have peace of mind. 
  • Consider a credit freeze to keep anyone from opening accounts in your name.


linkedin hacked

Are There Any Lawsuits For the LinkedIn Breach?

There was a $5 million class-action lawsuit, but the courts dismissed it in 2013 due to a lack of evidence that anyone suffered any injury due to the data breach. However, that was before the data was sold on the dark web.

If you were a paid Premium member, you were included in another $1.25 million class-action lawsuit and would have received damages as part of that. Each member was awarded a payout of up to $50.

Can My Information In LinkedIn Breach be Used for Identity Theft?

Yes, the information stolen can start the ball rolling for stealing your identity. All a scammer needs to begin is your email address. Then they can wage phishing or scam campaigns designed to fool you into providing the rest of the information they need. You may think you are dealing with your bank or some other reputable entity and happily log in or enter personal information; now, it’s in the hands of the hackers. You have to be on alert always to stay safe from identity theft.

How to Protect Yourself against LinkedIn Data Breach

It seems like every week we hear of another data breach somewhere. Although it may seem impossible to protect your information, there are things you can do to stay safe.

  • Keep your computer and mobile devices updated with the latest software and security patches along with antivirus programs.
  • Run deep scans often and watch out for malware.
  • Be on alert for suspicious emails that ask you to verify your information or threaten that you may be locked out of your account. Those are phishing emails designed to trick you.
  • Change all your online passwords frequently and use a complex combination of letters, numbers, and symbols.
About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close