Fri, Jun 08, 2012 - Page 1 News List

Passwords from LinkedIn, eHarmony leaked on Internet

AP, LONDON

Business social network LinkedIn and online dating service eHarmony said on Wednesday that some of their users’ passwords were stolen and millions appear to have been leaked onto the Internet.

LinkedIn Corp did not say how many of the more than 6 million passwords that were distributed online corresponded to LinkedIn accounts. In a blog post on Wednesday, the company said it was continuing to investigate.

Graham Cluley, a consultant with UK Web security firm Sophos, recommended that LinkedIn users change their passwords immediately.

LinkedIn has a lot of information on its more than 160 million members, including potentially confidential information related to jobs being sought. Companies, recruiting services and others have accounts alongside individuals who post resumes and other professional information.

Later on Wednesday, eHarmony said the passwords of a “small fraction” of its users had been compromised.

The site, which says it has more than 20 million registered online users, did not say how many had been affected.

However, tech news site Ars Technica said it found about 1.5 million passwords leaked online that appeared to be from eHarmony users.

The dating service said on its blog that it had reset the passwords of the affected users, who would receive an e-mail with instructions on how to set new passwords. It recommended that all its users adopt “robust” passwords.

Before confirming the breach, LinkedIn issued security tips as a precautionary measure. The company said users should change passwords at least every few months and avoid using the same ones on multiple sites.

Cluley said hackers are working together to break the encryption on the passwords.

“All that’s been released so far is a list of passwords and we don’t know if the people who released that list also have the related e-mail addresses,” he said. “But we have to assume they do. And with that combination, they can begin to commit crimes.”

It wasn’t known who was behind such an attack. LinkedIn’s blog post had few details about what happened. It said compromised passwords have been deactivated, and members with affected accounts would be sent e-mails with further instructions.

While the passwords appear to be encrypted, security researcher Marcus Carey warned that users should not take solace from such security measures.

“If a Web site has been breached, it doesn’t matter what encryption they’re using because the attacker at that point controls a lot of the authentication,” said Carey, who works at security-risk assessment firm Rapid7. “It’s ‘game over’ once the site is compromised.”

Cluley warned that LinkedIn users should be careful about malicious e-mail generated around the incident.

The fear is that people, after hearing about the incident, would be tricked into clicking on links in those e-mails. Instead of getting to the real LinkedIn site to change a password, it would go to a scammer, who can then collect the information and use it for criminal activities.

LinkedIn said its e-mails would not include any links.

This story has been viewed 1888 times.
TOP top