Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

[Recap] LinkedIn Sends Notices to Users, Last.fm Added to Recently Breached List

It’s been the story of the week; someone dumps a list of more than six million passwords on a Russian forum, and teams of people start cracking them. There are clear indications that they came from LinkedIn, which the social network later confirmed. Shortly after that, dating site eHarmony says they too had accounts compromised by the leak, and now Last.fm is in the mix. Here’s a recap, and a look at the letter LinkedIn is sending to users.

It’s been the story of the week; someone dumps a list of more than six million passwords on a Russian forum, and teams of people start cracking them. There are clear indications that they came from LinkedIn, which the social network later confirmed. Shortly after that, dating site eHarmony says they too had accounts compromised by the leak, and now Last.fm is in the mix. Here’s a recap, and a look at the letter LinkedIn is sending to users.

Given that many of you reading this have a LinkedIn account, we feel it is worth keeping tabs on things, despite the repeated coverage theme. For a recount of what’s happened so far, head here and here

As we said, LinkedIn confirmed they had accounts exposed by the massive hash leak, and eHarmony did the same. While this was taking place, scammers have jumped on the bandwagon. They’re using the news cycle to their advantage, blasting out thousands of emails in a Phishing attack, which claims to warn the user about the LinkedIn incident and offers help with password resets.

On Thursday, Last.fm, a highly popular music recommendation service, became the third massively large website to warn users about password security. It seems that they too had accounts exposed by the leaked password hashes.

“We are currently investigating the leak of some Last.fm user passwords. This follows recent password leaks on other sites, as well as information posted online. As a precautionary measure, we’re asking all our users to change their passwords immediately,” a blog post from the service stated. 

A similar warning is also displayed when a user accesses their account.

At this point, the $10,000 question is three-fold; who is behind the string of breaches; what else have they hit; and how did they do it. Given that no one is use, the fear is that password resets are useless, given that if there is a vulnerability that remains unpatched, the attackers can simply get the new passwords.

The issue of salting hashes has come to focus as well, thanks to all of this mess. F-Secure has a great write-up on the topic that’s worth reading. You can see that here.

Advertisement. Scroll to continue reading.

Finally, LinkedIn is sending emails to users in order to warn about the breach. Here’s what arrived in my inbox this morning.

“We recently became aware that some LinkedIn passwords were compromised and posted on a hacker website. We immediately launched an investigation and we have reason to believe that your password was included in the post. To the best of our knowledge, no email logins associated with the passwords have been published, nor have we received any verified reports of unauthorized access to any member’s account as a result of this event. While a small subset of the passwords was decoded and published, we do not believe yours was among them,” the letter states in part.

As you can see, the letter told me that my password was included in the leaked post, but they’re not certain if it was cracked. If it was, it’s no loss. I only used that password for LinkedIn and I changed it the day I wrote the first story. The rest of the email offers tips on resetting the password, and an apology.

We’ll keep following the story and report new developments as needed.

Related ReadingBusting Myths: Why SSL ≠ Application Security

RelatedCombating Password Cracking Tools in the Enterprise

Related: How Passwords Are Cracked and How You Can Keep Them Safer

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.