After Facebook’s massive data theft, today is LinkedIn’s turn. The news, published by CyberNews, reveals that the data of 500 million LinkedIn users were stolen and subsequently put up for sale by the author on a forum on the dark web. The amount required for 2 million data is only $ 2, while it rises to $ 1,800 for the complete package, preferably in Bitcoin.
After the news, LinkedIn also intervened with an official statement on its web profile stating: “We have examined an alleged series of data from LinkedIn that have been published for sale and we have determined that it is actually an aggregation of data from from a variety of websites and companies “.
In essence, LinkedIn claims that there has been no private data breach, only information that can be seen safely on a public account profile has been extracted. The technique used seems to be the one known as “web scraping”, in which the data is extracted through special software. “From what we were able to look at, no private LinkedIn member’s account data was included,” the Microsoft-owned company added. LinkedIn victim of web scraping: information on 500 million users stolen.
According to the source, data leaked from databases and put up for sale on the dark web includes information such as: LinkedIn ID, first and last names, email addresses, phone numbers, gender, job-related data, links to LinkedIn profiles and other social media.
In short, we are certainly not talking about very important data, but for an experienced hacker it can prove to be fundamental information that can be used to cause greater damage such as the theft of sensitive data. Consequently, one must be on the alert as affected users could be victims of phishing, calling, scams and identity theft.
Generally, the command that is most found on the web is the one with the snap, which installs with a simple skype command. Since I strongly advise against using snap (instead of apt) I give you a valid alternative:
The phone numbers and other personal information of 533 million Facebook users were leaked for free on a popular hacker forum. Italy is the third most affected nation with over 35 million users involved. The data in question began to peep into the hacking community last June, when one member began selling it to other members. The information may include, in addition to the phone number, also: Facebook ID, name, gender, location, sentimental status, occupation, date of birth and email addresses. The package also includes the phone numbers (probably no longer active) of Mark Zuckerberg, Chris Hughes and Dustin Moskovitz, one of the founders of the social network.
According to the BleepingComputer website, almost all users have a phone number, Facebook ID, name and gender associated with them. The package was stolen in 2019, as confirmed by Facebook, exploiting a vulnerability now fixed in the “Add a friend” function. It is not known whether this alleged vulnerability allowed the attackers to retrieve all the information disclosed or just the telephone number, and then combine it with the data obtained from public profiles. The certainty is that after the initial sale, it is thought for 30 thousand dollars, another attacker had created in January of this year a private Telegram bot that allowed other interested hackers to pay to access the collected data. The novelty is that this data package has now been distributed free of charge to obtain eight credits on the forum, for a value of 2.19 dollars. The goal is clearly to gain notoriety, obviously only after filling your pockets. Although the data is at least two years old, many people don’t change their email or phone number for a very long time, so a lot of information could be valuable for conducting targeted attacks. Email addresses can be useful for phishing attacks, while phone numbers for so-called smishing (phishing via SMS), but also for tackling SIM swap attacks to steal two-factor authentication codes sent via SMS.