LinkedIn user alerts mistakenly blocked as spam
Researcher says more than 4% of intended recipients blocked LinkedIn's email instructions on resetting breached passwords
Computerworld - Many of the LinkedIn emails alerts instructing users on how to reset passwords accessed by hackers were dumped into spam boxes, according to email security vendor Cloudmark.
In a blog post on Tuesday. Andrew Conway, a Cloudmark researcher, said a substantial increase in spam reports last weekend were traced to LinkedIn password reset email alerts
In many cases, the emails that users' marked as spam were legitimate alerts from LinkedIn, Conway said.
"Over 4% of the people receiving this email thought it was spam and sent it straight to the bit bucket," Conway said. "If Linkedin sends out 6.5 million emails, then a quarter of a million people are congratulating themselves on avoiding spam -- and still have a compromised Linkedin password."
Conway said that LinkedIn did all the right things to ensure that users would not treat its emails with suspicion. All were addressed to the recipient by name, did not contain any links and were DomainKeys Identified Mail (DKIM) signed to validate their authenticity.
"Even so, it was taken for spam," Conway said. "Part of the problem is that people are used to getting email that they don't want from LinkedIn, and rather than unsubscribe, some of them just mark it as spam and hope that it will go away."
In an email to Computerworld, Conway said that Cloudmark, a provider of messaging security services to Internet Service Providers, monitors messages for clients by assigning a number of digital signatures based on the content of the messages. Thus it can determine which signatures are present on emails that are manually flagged as spam by users.
"The Linkedin compromised email message[s] generated several unique signatures, so we are able to measure the rate at which these are marked [by users] as spam," he said.
Cloudmark was able to confirm that LinkedIn, and not spammers had sent the alerts because the emails were DKIM signed by Linkedin.com, he said.
The alerts were sent after hackers last week accessed about 6.5 million hashed passwords from a LinkedIn database and posted the stolen data on Russian hacker site.
By last weekend, most of the passwords were believed to have been decrypted by hackers and made available in plain text on many sites.
LinkedIn has confirmed the password compromise but released few details about the incident.
In three separate LinkedIn communications about the incident, the company didn't say how the passwords were accessed or whether other data, such as email IDs, were also compromised. LinkedIn said only that no email IDs have yet been publicly posted.
The latest LinkedIn update, posted yesterday, repeats much of the information that was included in previous notes.
The latest post did say that all passwords posted by the hackers, and that "we believed created risk for our members, based on our investigation," have been disabled.
Since the attack, LinkedIn has come in for some criticism for not better protecting passwords.
The company has said that it has completed a "long-planned transition" from merely hashing passwords to a system that both hashes and salts passwords. Salting is a process in which a random string of characters is appended to a password before it is hashed.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- US agencies to release cyberthreat info faster to healthcare industry
- UPS now the third company in a week to disclose data breach
- Healthcare organizations still too lax on security
- Why would Chinese hackers want US hospital patient data?
- About 4.5M face risk of ID theft after hospital network hacked
- Supervalu breach shows why move to smartcards is long overdue
- Grocery stores in multiple states hit by data breach
- Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
- U.S. agencies halt background checks by contractor after cyberattack
- Five unanswered questions about massive Russian hacker database
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts