
What Happened
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.
Compromised Data
Recommended Actions
Change Your Password
If you haven't changed your password on this service since the breach, do so immediately.
Enable Two-Factor Authentication
If 2FA is supported, add an extra layer of security to your account.
After a breach every click matters. Guardio’s AI-powered protection is the only solution that shields you from phishing, scams, and fake logins before they cause damage.
Try GuardioUse a password manager to generate and store strong, unique passwords for all your accounts. 1Password helps protect your data with industry-leading security.
Try 1PasswordGet Aura for identity theft and credit protection. Keep your assets safe with fast fraud alerts, instant credit lock, and $1,000,000 identity theft insurance. Speak to a U.S. based fraud specialist 24/7.
Try AuraBreach Overview
-
Affected Accounts:
164.6 million
-
Breach Occurred:
May 2012
-
Added to HIBP:
21 May 2016
Recommended Actions
Change Your Password
If you haven't changed your LinkedIn password since 2012, do so immediately.
Enable Two-Factor Authentication
Add an extra layer of security to your account.
Get Aura for identity theft and credit protection. Keep your assets safe with fast fraud alerts, instant credit lock, and $1,000,000 identity theft insurance. Speak to a U.S. based fraud specialist 24/7.
Try AuraUse a password manager to generate and store strong, unique passwords for all your accounts. 1Password helps protect your data with industry-leading security.
Try 1Password