Anatomy of a Breach

Anatomy of a Breach: LinkedIn — 117 Million Passwords and the Credential Breach That Kept Growing

> series: anatomy_of_a_breach —— part: 042 —— target: linkedin —— accounts: 117,000,000 —— hashing: unsalted_sha1<span class="cursor-blink">_</span>_

Hedgehog Security 30 June 2012 13 min read

117 million accounts. Unsalted SHA-1. The breach that would not stop.

On 6 June 2012, approximately 6.5 million LinkedIn password hashes were posted to a Russian hacking forum. LinkedIn confirmed the breach and forced password resets for affected accounts. The passwords had been stored using unsalted SHA-1 — a hashing algorithm that, without salting, allows attackers to crack passwords using precomputed rainbow tables at enormous speed. Within hours, a significant proportion of the hashes had been cracked, exposing the plaintext passwords of millions of professionals.

But the story was far from over. In May 2016 — four years after the original disclosure — it emerged that the actual breach had compromised not 6.5 million but 117 million accounts. A hacker known as 'Peace' offered the full dataset for sale on the dark web for 5 Bitcoin (approximately $2,200 at the time). The four-year gap between the breach and the revelation of its true scale meant that 117 million users had been at risk without knowing it — their credentials potentially used for credential-stuffing attacks against email, banking, and corporate accounts throughout that period.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Unsalted SHA-1 — a decade behind best practice.

LinkedIn's use of unsalted SHA-1 for password storage was, by 2012 standards, indefensible. SHA-1 is a fast hashing algorithm — it was designed for speed, not for password storage. Without salting (adding a unique random value to each password before hashing), identical passwords produce identical hashes, enabling precomputed rainbow table attacks that can crack millions of passwords in seconds. By 2012, bcrypt — the algorithm that Zappos used — had been available for over a decade.

Algorithm Suitable for Passwords? Why
Unsalted SHA-1 (LinkedIn) No — critically weak Fast algorithm, no salt. Rainbow tables crack millions of hashes instantly. Our password cracking article demonstrates this.
Unsalted MD5 (HBGary) No — critically weak Even faster than SHA-1. Trivially crackable with commodity hardware.
DES (Gawker) No — obsolete 56-bit key length. Brute-forceable on modern hardware in minutes.
bcrypt (Zappos) Yes — appropriate Deliberately slow, configurable work factor, built-in salting. Designed for password storage.
Argon2 (modern best practice) Yes — current best Memory-hard, GPU-resistant. Current OWASP recommendation. Cyber Essentials expects appropriate authentication controls.

117 million passwords weaponised across the internet.

The LinkedIn breach was devastating not just for LinkedIn users but for every service where those users had reused their LinkedIn password. Credential-stuffing attacks — automated attempts to log into other services using stolen username/password combinations — became a major threat vector fuelled by the LinkedIn dataset. Corporate accounts, email services, banking platforms, and VPN portals were all targeted using LinkedIn credentials, because professionals often use the same password across multiple platforms.

This cascade effect is why multi-factor authentication — now a Cyber Essentials Danzell auto-fail criterion — is essential. MFA breaks the credential-reuse chain: even if an attacker has a valid password from a LinkedIn-style breach, they cannot authenticate without the second factor. For ongoing monitoring of credential exposure, dark web monitoring through SOC in a Box detects when your organisation's credentials appear in breach datasets — enabling forced password resets before the credentials are used. Our web application testing verifies password storage security, and UK Cyber Defence provides incident response when credential compromise is detected.


Your staff use LinkedIn. LinkedIn was breached. Are their corporate passwords the same?

<a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors dark web breach databases for your organisation's credentials. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA. Our <a href="/penetration-testing/web-application">application testing</a> verifies your password storage is not the next LinkedIn.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles