Data leak
LinkedIn 700M Profile API Scrape (93% of All Users)
Primary Source βIncident Details
In June 2021, data for approximately 700 million LinkedIn users β representing 93% of LinkedIn’s total user base at the time β was posted for sale on RaidForums by a user calling themselves ‘GOD User TomLiner.’ A sample of 1 million records was offered as proof. The data was compiled through systematic API scraping of LinkedIn’s public profile data combined with other public sources. LinkedIn investigated and stated the data did not include private member account data, but acknowledged it was scraped from public and non-public LinkedIn data. The exposed data included names, email addresses, phone numbers, physical addresses, geolocation records, LinkedIn usernames and profile URLs, personal and professional experience/background, genders, and other social media accounts and usernames. LinkedIn argued this constituted a terms-of-service violation rather than a data breach. The incident highlighted the difficulty of distinguishing between ‘public’ data scraping and data breach under privacy law, and prompted GDPR investigations in multiple EU jurisdictions. Note: separate from the 2012 LinkedIn credential theft breach (117M hashed passwords).
Technical Details
- Initial Attack Vector
- Systematic API scraping and data aggregation from LinkedIn's public profile data and APIs; attacker 'GOD User TomLiner' combined LinkedIn API data with other publicly available sources
- Vendor / Product
- LinkedIn (public profile API)
Timeline
- 2021-05-01 Breach occurred
- 2021-06-22 Publicly disclosed