![]() ![]() ![]() Instead, some of the data likely came from other sources. ![]() However, LinkedIn has emailed us an explanation, stating that not all of the data could have been acquired through the LinkedIn API. You can see that he is asking $5,000 for the complete data set, and stating that the data was acquired through the LinkedIn API. He claims the data was obtained by exploiting the LinkedIn API to harvest information that people upload to the site.īelow is one interaction we had with the threat actor on Telegram. We reached out directly to the user who is posting the data up for sale on the hacking forum. While we did not find login credentials or financial data in the samples we examined, there is still a treasure trove of information for bad actors to exploit for financial gain, as we’ll explain more below. Additionally, the data does appear to be up to date, with samples from 2020 to 2021. Since LinkedIn has 756 million users, according to its website, this would mean that 92% of all LinkedIn users can be found in these records.īelow is a small section of the sample we examined to show you how much information one record can contain: In this sample you can see full names, LinkedIn usernames, Facebook usernames, email accounts, mobile phone numbers, professional data, inferred salary, and more.īased on our analysis and cross-checking data from the sample with other publicly available information, it appears all data is authentic and tied to real users. The user claims that the complete database contains the personal information of 700 Million LinkedIn users. This is one of the largest LinkedIn data dumps we have seen.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |