

Remember, Peace_of_Mind was also selling 200 million Yahoo, 427 Million MySpace, 1.1 million Lookbook.nu and 100 Million Russian VK.com accounts.Īlso Read: Kickass Torrents Goes Down Owner Arrested In May this year, a hacker going by the online handle of Peace_of_Mind was found selling the stolen LinkedIn data from 2012 on a darknet marketplace however at this time it is unclear if Yevgeniy N is Peace_of_Mind or not. “We are thankful for the hard work and dedication of the FBI in its efforts to locate and capture the parties believed to be responsible for this criminal activity.” “Following the 2012 breach of LinkedIn member information, we have remained actively involved with the FBI’s case to pursue those responsible,” LinkedIn said in the statement. LinkedIn, on the other hand, has released a statement of thanks to the authorities and revealed that the company was actively involved during the whole process. The intensity of this breach was so much that several hacking groups started buying the LinkedIn data and use stolen passwords to further hack user accounts on social media including Twitter accounts of Google CEO Mr. Reuters reported that the hacker is 29-year-old Yevgeniy N who was arrested on 5th October under the suspicion of taking part in one of the largest data breaches that affected millions of users including job seekers worldwide. The local law enforcement authorities in Prague along with the help of Federal Bureau of Investigation (FBI) have arrested an alleged Russian hacker responsible for the massive LinkedIn data breach in 2012 in which account details of 117 million users was stolen and leaked online in May 2016. All Rights Reserved.The alleged LinkedIn hacker was arrested in a restaurant while ordering food - The video of his arrest has been linked in this article. All content of the Dow Jones branded indices © S&P Dow Jones Indices LLC 2019 and/or its affiliates.
LINKEDIN DATA BREACH 2012 PASSWORD
Standard & Poor's and S&P are registered trademarks of Standard & Poor's Financial Services LLC and Dow Jones is a registered trademark of Dow Jones Trademark Holdings LLC. LinkedIn has linked Nikulin to the 2012 breach and said it resulted in more than 100 million of its users passwords being compromised, prompting a massive password reset operation. Dow Jones: The Dow Jones branded indices are proprietary to and are calculated, distributed and marketed by DJI Opco, a subsidiary of S&P Dow Jones Indices LLC and have been licensed for use to S&P Opco, LLC and CNN. Chicago Mercantile Association: Certain market data is the property of Chicago Mercantile Exchange Inc. Factset: FactSet Research Systems Inc.2019. Market indices are shown in real time, except for the DJIA, which is delayed by two minutes. "We take the safety and security of our members' accounts seriously," wrote Cory Scott, the company's chief information security officer. Hackers are selling the stolen LinkedIn database on a black market online called "The Real Deal," according to tech news site Motherboard.įor its part, LinkedIn offered the same, go-to statement used by every company after a data breach. "If LinkedIn is only now discovering the scale of data that was exfiltrated from their systems, what went wrong with the forensic analysis that should have discovered this?" said Brad Taylor, CEO of cybersecurity firm Proficio. Now, computer security experts are wondering why it took so long for LinkedIn to figure out what happened to their own company computers - or acknowledge it publicly. This particular hack affects a quarter of the company's 433 million members. LinkedIn said it's reaching out to individual members affected by the breach. The company is also invalidating all customer passwords that haven't been updated since they were stolen. Put on the defensive, LinkedIn is now scrambling to try to stop people from sharing the stolen goods online - often an impractical task. But at the time of the 2012 data breach, LinkedIn hadn't added a pivotal layer of security that makes the jumbled text harder to decode.

LINKEDIN DATA BREACH 2012 CRACK
This episode drudges up some embarrassing history for LinkedIn.īecause of the company's old security policy, these passwords are easy for hackers to crack in a matter of days.Ĭompanies typically protect customer passwords by encrypting them.
