We hadn't gotten over with the Facebook data leak of 533 million users, that another data leak news blew into our faces. This time, it's Linkedin. The leaked data was put on sale on a hacker forum. A hacker uploaded a data sample on the website to view at $2 worth of forum credits, and an offer was proposed for the 500 million user data. A minimum four-figure price was asked.
Cybernews has a personal data leak checker where you can know whether your profile was one of the leaked profiles or not. Cybernews also looked at the data samples to confirm whether the post was true or not. After checking, it was confirmed that the data belongs to the LinkedIn users. However, they are not sure whether the data is up to date or it is just the collection of data taken from different breaches that happened earlier. The recent Facebook data leak was also of a similar figure. And, most people use a common login for both platforms. LinkedIn data leak happened just days after the Facebook data leak, so it is speculated that it might contain similar data. An official statement from LinkedIn confirms this.
"We have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn. This was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we've been able to review."
Even if it is a collection of old breaches, the potential hackers can combine the data sets from different breaches and create major profiles. It can then be used to carry out phishing attacks, identity thefts, ransomware attacks, and much more. The hackers might also Brute-force the LinkedIn Login and passwords. Brute-forcing is the action hackers take to crack the login and password of a profile by trying different combinations of the letters and characters. They can try this on any platform if they become successful on one platform.
Work From Home culture is being followed worldwide, and employees do leave loose ends on unsecured networks. Hackers look for these loose ends, and they need just one opening. Computan employees were instructed to follow the security measures to keep their personal and the company's data secure. Here are the cybersecurity precautions Computan employees took while working from home. These protocols were as necessary as washing hands and using sanitizers to protect ourselves from the virus attack.
Follow these measures to protect your website from hacking attacks.