Credential theft

LinkedIn Unsalted SHA-1 Password Breach (117M Credentials)

πŸ“… 2012-05-01
Primary Source β†—

Incident Details

In June 2012, LinkedIn disclosed that a subset of member passwords had been compromised after approximately 6.5 million unsalted SHA-1 password hashes appeared on a Russian security forum. LinkedIn initially downplayed the breach. In May 2016, the full magnitude was revealed when a hacker offered 117 million LinkedIn email/password combinations for sale on dark web markets β€” revealing the true breach scope was approximately 18x larger than originally admitted. The breach was significant for several reasons: (1) LinkedIn stored passwords as unsalted SHA-1 hashes β€” a critically weak approach that allowed rainbow table and brute-force attacks to crack most passwords within days; (2) the delayed disclosure of the full scope (4 years) caused a second wave of victims as people had not changed their passwords; (3) the 117M credential set became one of the most widely used collections for credential stuffing attacks against other platforms, fueling a wave of follow-on breaches. LinkedIn settled a class action for $1.25 million and the breach drove widespread adoption of bcrypt and scrypt for password hashing.

Technical Details

Initial Attack Vector
SQL injection or server compromise allowed attackers to exfiltrate LinkedIn's password database containing unsalted SHA-1 password hashes; in 2016, the full scope (117M records) was revealed when the data appeared for sale

Timeline

  1. 2012-05-01 Breach occurred
  2. 2012-06-06 Publicly disclosed
  3. 2012-06-06 Customers notified