IDs, names, email addresses, and more personal details of LinkedIn users are part of the massive database of stolen data, which could be used to launch additional attacks.
A massive trove of LinkedIn account data has been found for sale online, containing 500 million user records including email addresses, phone numbers, links to other social media profiles and professional details.
An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author.
The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information, and more.
To see if your email address has been exposed in this data leak or other security breaches, use our personal data leak checker with a library of 15+ billion breached records.
While users on the hacker forum can view the leaked samples for about $2 worth of forum credits, the threat actor appears to be auctioning the much-larger 500 million user database for at least a 4-digit sum, presumably in bitcoin.
What was leaked?
Based on the samples we saw from the leaked files, they appear to contain a variety of mostly professional information from LinkedIn profiles, including:
- LinkedIn IDs
- Full names
- Email addresses
- Phone numbers
- Links to LinkedIn profiles
- Links to other social media profiles
- Professional titles and other work-related data
An example of leaked data:
What’s the impact of the leak?
The data from the leaked files can be used by threat actors against LinkedIn users in multiple ways by:
- Carrying out targeted phishing attacks.
- Spamming 500 million emails and phone numbers.
- Brute-forcing the passwords of LinkedIn profiles and email addresses.
The leaked files appear to only contain LinkedIn profile information – we did not find any deeply sensitive data like credit card details or legal documents in the sample posted by the threat actor. With that said, even an email address can be enough for a competent cybercriminal to cause real damage.
Particularly determined attackers can combine information found in the leaked files with other data breaches in order to create detailed profiles of their potential victims. With such information in hand, they can stage much more convincing phishing and social engineering attacks or even commit identity theft against the people whose information has been exposed on the hacker forum.
If you suspect that your LinkedIn profile data might have been scraped by threat actors, we recommend you:
- Use our personal data leak checker to find out if your LinkedIn data has been leaked by the threat actor.
- Beware of suspicious LinkedIn messages and connection requests from strangers.
- Change the password of your LinkedIn and email accounts.
- Consider using a password manager to create strong passwords and store them securely.
- Enable two-factor authentication (2FA) on all your online accounts.
If you find it interesting, you can read: