Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

LinkedIn Sued After Server Breach Exposed Millions of Passwords

LinkedIn Law Suit Seeks $5M In Damages Over Lax Security Practices

LinkedIn Law Suit Seeks $5M In Damages Over Lax Security Practices

Earlier this month, June 5 to be exact, someone uploaded approximately 6.5 million passwords to a Russian online forum. The upload turned into a community password effort and a lesson in password security for the corporate social network. Now, LinkedIn is facing a lawsuit for alleged security failures that in some cases are legitimate complaints.

The class action lawsuit seeks a trial by jury, and was filed by Katie Szpyrka of Illinois. She has been a paid member of LinkedIn since 2010, and paid $26 per month for her account. In her suit, she says that LinkedIn violated their own privacy policy when they claimed to comply with industry data security standards.

LinkedIn Breach Analysis

“LinkedIn failed to use a modern hashing and salting function, and therefore drastically exacerbated the consequences of a hacker by bypassing its outer layer of security. In so doing, defendant violated its privacy policy’s promise to comply with industry standard protocols and technology for data security,” the initial complaint says. “That LinkedIn did not recognize its databases had been compromised until it was informed through public channels provides further evidence that the company didn’t adhere to industry standards. Specifically, LinkedIn did not implement, or it poorly implemented, an intrusion detection system to properly identify and quickly respond to attacks on its servers.”

The lawsuit also makes mention of the fact that notices related to the breach were delivered too late to matter, noting that when they were eventually released, they were blocked by spam filters.

Last week, SecurityWeek reported on this interesting observation, when Cloudmark said users were marking legit LinkedIn emails as spam, ignoring the warnings being delivered entirely. It was suggested that the legit warnings were getting the axe because of the media hype covering the risk of Phishing and other fraud related to the breach.

Almost as soon as word of LinkedIn’s problems hit the wires, experts started warning about password related scams and Phishing attempts.

“Over four percent of the people receiving this email, thought it was spam and sent it straight to the bit bucket. If LinkedIn sends out 6.5 million emails, then a quarter of a million people are congratulating themselves on avoiding spam, and still have a compromised LinkedIn password,” Cloudmark explained.

Advertisement. Scroll to continue reading.

Szpyrka is seeking $5 million in damages. LinkedIn says the suit is without merit and that they will fight it.

Related Reading: LinkedIn Breach: How a 6.5M Hole Could Sink a 160M Ship

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.