Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

LinkedIn Sued After Server Breach Exposed Millions of Passwords

LinkedIn Law Suit Seeks $5M In Damages Over Lax Security Practices

LinkedIn Law Suit Seeks $5M In Damages Over Lax Security Practices

Earlier this month, June 5 to be exact, someone uploaded approximately 6.5 million passwords to a Russian online forum. The upload turned into a community password effort and a lesson in password security for the corporate social network. Now, LinkedIn is facing a lawsuit for alleged security failures that in some cases are legitimate complaints.

The class action lawsuit seeks a trial by jury, and was filed by Katie Szpyrka of Illinois. She has been a paid member of LinkedIn since 2010, and paid $26 per month for her account. In her suit, she says that LinkedIn violated their own privacy policy when they claimed to comply with industry data security standards.

LinkedIn Breach Analysis

“LinkedIn failed to use a modern hashing and salting function, and therefore drastically exacerbated the consequences of a hacker by bypassing its outer layer of security. In so doing, defendant violated its privacy policy’s promise to comply with industry standard protocols and technology for data security,” the initial complaint says. “That LinkedIn did not recognize its databases had been compromised until it was informed through public channels provides further evidence that the company didn’t adhere to industry standards. Specifically, LinkedIn did not implement, or it poorly implemented, an intrusion detection system to properly identify and quickly respond to attacks on its servers.”

The lawsuit also makes mention of the fact that notices related to the breach were delivered too late to matter, noting that when they were eventually released, they were blocked by spam filters.

Last week, SecurityWeek reported on this interesting observation, when Cloudmark said users were marking legit LinkedIn emails as spam, ignoring the warnings being delivered entirely. It was suggested that the legit warnings were getting the axe because of the media hype covering the risk of Phishing and other fraud related to the breach.

Almost as soon as word of LinkedIn’s problems hit the wires, experts started warning about password related scams and Phishing attempts.

“Over four percent of the people receiving this email, thought it was spam and sent it straight to the bit bucket. If LinkedIn sends out 6.5 million emails, then a quarter of a million people are congratulating themselves on avoiding spam, and still have a compromised LinkedIn password,” Cloudmark explained.

Szpyrka is seeking $5 million in damages. LinkedIn says the suit is without merit and that they will fight it.

Related Reading: LinkedIn Breach: How a 6.5M Hole Could Sink a 160M Ship

Written By

Click to comment

Expert Insights

Related Content

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Incident Response

Cygnvs emerges from stealth mode with an incident response platform and $55 million in Series A funding.

Data Breaches

T-Mobile disclosed another massive data breach affecting approximately 37 million customer accounts.

Incident Response

A new Mississippi Cyber Unit will be the state’s centralized cybersecurity threat information, mitigation and incident reporting and response center.


Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack by...


Thoma Bravo will spend $1.3 billion to acquire Canadian software firm Magnet Forensics, expanding a push into the lucrative cybersecurity business.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.