Skip to main content

LinkedIn - Weak Passwords & Poor Protection?

Last week saw the release of 6.5 million passwords for the online professional social network LinkedIn.  LinkedIn, for those that don't use it, is a place to publish an online version of your career history and connect to work colleagues and acquaintances away from the more friends focused Facebook.  The site is popular, with over 160 million users spread across 200 countries, with no real direct competitor.

The release contained only the passwords of the users and not the associated email addresses, making the hack only slightly less worrying.  The passwords were also hashed, seemingly with the SHA1 algorithm, but unsalted.  The salting factor is generally what makes hashing more secure and without, many of the passwords were easily reversed back into plain text.  The failure to properly use a salt during the hashing phase is deemed to be a major failure in basic password security.

It was the analysis of the hashed passwords that initially led to the news that the leaked passwords were in fact from the LinkedIn site.  Several of the passwords used the words 'linkedin' or 'LinkedIn' within them.  The hashed passwords were then posted onto a Russian on line forum where users were asked for help in the reverse hashing process.  Whilst several of the passwords have allegedly been reversed into plain text, many argue that out of the 6.5 million, only a small percentage of the easiest passwords will be converted to plaintext.

Whilst the true risk could be relatively small, LinkedIn's response has been swift.  An acknowledgement arrived saying data had been released and the accounts their believed to be impacted have had a password reset requirement flag set.  The questions still arise: How did the hackers get access to the hash data?  How long had they had access for?  More importantly, if the entry method is still unknown, do LinkedIn know that they no longer have access?

A prompt to quickly reset all 6.5 million passwords, is futile if the hackers also have access to the new hash data...  Another area of concern is that LinkedIn also offers a premium service that would require the credit card details to be used to pay for the subscription.  Was this data compromised?

The main remediation steps seem to have been to forcefully reset the accounts of those known to be effected, whilst a blog entry by Linked In Director Vincente Silveira advises for everyone to reset their password on Linked In regularly and to not use the same password for multiple sites.  The password, of course should be as long and complex as possible (whilst still being able to remember it..)

As many on line sites become more popular, it is inevitable a hacking incident or a breach will occur simply due to the complexity of the sites involved (huge data centres, many members of staff, contractors, integration points & 3rd party libraries) as well as the huge driver of being a hacker against large and well known brands.

Whilst many will argue that poor protection of the assets is to be blame, individuals will have a duty as well, for making sure passwords are secure and kept safe.  Ultimately though, it's up to the service provider to keep information assets secure and develop trust between themselves and their community.  Incidents like this, although potentially more newsworthy than truly impacting, serve to destroy that trust and image.

(Simon Moffatt)





Popular posts from this blog

Top 5 Security Predictions for 2016

It's that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin.  This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on:


Customer Identity ManagementThe start of IoT security awarenessReduced Passwords on MobileConsumer PrivacyCloud Single Sign On
In retrospect, a pretty accurate and ongoing list.  Consumer related identity (cIAM) is hot on most organisation's lips, and whilst the password hasn't died (and probably never will) there are more people using things like swipe login and finger print authentication than ever before.

But what will 2016 bring?


Mobile Payments to be Default for Consumers

2015 has seen the rise in things like Apple Pay and Samsung Pay hitting the consumer high street with venom.  Many retail outlets now provide the ability to "tap and pay" using a mobile device, with many banks also offer…

Customer Data: Convenience versus Security

Organisations in both the public and private sector are initiating programmes of work to convert previously physical or offline services, into more digital, on line and automated offerings.  This could include things like automated car tax purchase, through to insurance policy management and electricity meter reading submission and reporting.

Digitization versus Security

This move towards a more on line user experience, brings together several differing forces.  Firstly the driver for end user convenience and service improvement, against the requirements of data security and privacy.  Which should win?  There clearly needs to be a balance of security against service improvement.  Excessive and prohibitive security controls would result in a complex and often poor user experience, ultimately resulting in fewer users.  On the other hand, poorly defined security architectures, lead to data loss, with the impact for personal exposure and brand damage.

The Role of Identity Management in the GDPR

Unless you have been living in a darkened room for a long time, you will know the countdown for the EU's General Data Protection Regulation is dramatically coming to a head.  May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order to comply.

Whilst many organisations are looking at employing a Data Privacy Officer (DPO), reading through all the legalese and developing data analytics and tagging processes, many need to embrace and understand the requirements with how their consumer identity and access management platform can and should be used in this new regulatory setting.

My intention in this blog, isn't to list every single article and what they mean - there are plenty of other sites that can help with that.  I want to really highlight, some of the more identity related components of the GDPR and what needs to be done.

Personal Data On the the personal data front, more and more org…