> series: anatomy_of_a_breach —— part: 042 —— target: linkedin —— accounts: 117,000,000 —— hashing: unsalted_sha1<span class="cursor-blink">_</span>_
On 6 June 2012, approximately 6.5 million LinkedIn password hashes were posted to a Russian hacking forum. LinkedIn confirmed the breach and forced password resets for affected accounts. The passwords had been stored using unsalted SHA-1 — a hashing algorithm that, without salting, allows attackers to crack passwords using precomputed rainbow tables at enormous speed. Within hours, a significant proportion of the hashes had been cracked, exposing the plaintext passwords of millions of professionals.
But the story was far from over. In May 2016 — four years after the original disclosure — it emerged that the actual breach had compromised not 6.5 million but 117 million accounts. A hacker known as 'Peace' offered the full dataset for sale on the dark web for 5 Bitcoin (approximately $2,200 at the time). The four-year gap between the breach and the revelation of its true scale meant that 117 million users had been at risk without knowing it — their credentials potentially used for credential-stuffing attacks against email, banking, and corporate accounts throughout that period.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallLinkedIn's use of unsalted SHA-1 for password storage was, by 2012 standards, indefensible. SHA-1 is a fast hashing algorithm — it was designed for speed, not for password storage. Without salting (adding a unique random value to each password before hashing), identical passwords produce identical hashes, enabling precomputed rainbow table attacks that can crack millions of passwords in seconds. By 2012, bcrypt — the algorithm that Zappos used — had been available for over a decade.
| Algorithm | Suitable for Passwords? | Why |
|---|---|---|
| Unsalted SHA-1 (LinkedIn) | No — critically weak | Fast algorithm, no salt. Rainbow tables crack millions of hashes instantly. Our password cracking article demonstrates this. |
| Unsalted MD5 (HBGary) | No — critically weak | Even faster than SHA-1. Trivially crackable with commodity hardware. |
| DES (Gawker) | No — obsolete | 56-bit key length. Brute-forceable on modern hardware in minutes. |
| bcrypt (Zappos) | Yes — appropriate | Deliberately slow, configurable work factor, built-in salting. Designed for password storage. |
| Argon2 (modern best practice) | Yes — current best | Memory-hard, GPU-resistant. Current OWASP recommendation. Cyber Essentials expects appropriate authentication controls. |
The LinkedIn breach was devastating not just for LinkedIn users but for every service where those users had reused their LinkedIn password. Credential-stuffing attacks — automated attempts to log into other services using stolen username/password combinations — became a major threat vector fuelled by the LinkedIn dataset. Corporate accounts, email services, banking platforms, and VPN portals were all targeted using LinkedIn credentials, because professionals often use the same password across multiple platforms.
This cascade effect is why multi-factor authentication — now a Cyber Essentials Danzell auto-fail criterion — is essential. MFA breaks the credential-reuse chain: even if an attacker has a valid password from a LinkedIn-style breach, they cannot authenticate without the second factor. For ongoing monitoring of credential exposure, dark web monitoring through SOC in a Box detects when your organisation's credentials appear in breach datasets — enabling forced password resets before the credentials are used. Our web application testing verifies password storage security, and UK Cyber Defence provides incident response when credential compromise is detected.
<a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors dark web breach databases for your organisation's credentials. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA. Our <a href="/penetration-testing/web-application">application testing</a> verifies your password storage is not the next LinkedIn.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call