Please fill in the form below to subscribe to our blog

Widespread Credential Exposure is the Fallout of the Massive LinkedIn Data Breach

July 02, 2021

Your Data Was Probably Exposed


LinkedIn suffered another monster data breach that came to light this week. Earlier this week, the data of 700M LinkedIn users appeared on a popular dark web forum. That number is more than 92% of LinkedIn’s estimated total of 756M users – and a boatload of exposed data.


See how ransomware really works, who gets paid & what’s next in our NEW tell-all Ransomware Exposed! DOWNLOAD IT>>


If You’re a LinkedIn User, Your Data Was Probably Exposed


In the original post, first reported by Privacy Sharks, the hacker with the goods posted a sample as proof of the hack that contained about 1 million records. Experts and researchers in multiple security organizations have confirmed that the data was genuine. To add insult to injury, Restore Privacy reports that this hack appears to have been carried out by exploiting the same vulnerability that hackers used to scrape 500 million user accounts just three months ago in April 2021.  

This hack is huge for another reason. This scrape isn’t just a quick scoop up of average, basic user data. This treasure trove for cybercriminals contains a plethora of sensitive and personally identifiable information that can be used to facilitate all manner of cybercrime from spear phishing to business email compromise scams or identity theft. It’s a danger to both workers and businesses. Experts are warning LinkedIn users that after studying the sample provided by the hacker, they’ve determined that extensive personally-identifying information (PII) may have been exposed in this incident including: 

  • Email Addresses 
  • Full names 
  • Phone numbers 
  • Physical addresses 
  • Inferred salaries 
  • Geolocation records 
  • LinkedIn username and profile URL 
  • Personal and professional experience/background 
  • Genders 
  • Other social media accounts and usernames 

global year in breach depicted as a printed report.

Give your clients the cold, hard facts that tell the tale of exactly how much danger their business is in. GET THIS FREE BOOK>>


So What Should You Do?


The sequence of steps that your company will take in the event of a cyberattack or data breach should be delineated in your incident response plan, right down to who is going to handle the publicity and how they’re going to do that. Put the powerful solutions in the ID Agent digital risk protection platform to work for you to sensibly and affordably protect your organization from today’s biggest cybercrime threats.  Contact one of our solutions experts today for a personalized demo.


top phishing scams of 2020

Stay off the hook and on the job by avoiding phishing attacks that might carry ransomware with our eBook The Phish Files. GET IT>>



let us help secure you against passwords reuse with contact information and the ID Agent logo on grey.

Our Partners typically realize ROI in 30 days or less. Contact us today to learn why 3,850 MSPs in 30+ countries choose to Partner with ID Agent!

LEARN MORE>>


See our innovative, cost-effective digital risk protection solutions in action.

WATCH DEMO VIDEOS>>


Contact us for an expert analysis of your company’s security needs and a report on your Dark Web exposure!

SCHEDULE IT NOW>>