LinkedIn hit with lawsuit over massive data breach
A lawsuit seeking class-action status said the company failed to implement 'industry standard' security measures
IDG News Service - LinkedIn has been hit with a potential class-action lawsuit alleging it failed to meet "industry standard" security practices in connection with a massive data breach earlier this month, according to court documents.
On June 6, users learned that hackers had gained access to LinkedIn's databases when 6.5 million LinkedIn passwords were posted to an underground forum.
The lawsuit was filed Monday on behalf of a single subscriber to LinkedIn's premium services, Illinois resident Katie Szpyrka. It's seeking certification as a class-action lawsuit on behalf of all LinkedIn users.
The suit claims LinkedIn failed to use "long standing industry standard encryption protocols," exposing its users' personally identifiable information. LinkedIn engaged in deceptive practices, the suit says, by claiming to use industry standard protocols to safeguard users' information.
LinkedIn called the suit "without merit" and said it would defend itself "vigorously."
"No member account has been breached as a result of the incident, and we have no reason to believe that any LinkedIn member has been injured. Therefore, it appears that these threats are driven by lawyers looking to take advantage of the situation," LinkedIn spokeswoman Erin O'Harra said in an email.
Lawyers for Szpyrka could not immediately be reached for comment.
LinkedIn stored passwords in "hashed," or encrypted format, but did not "salt" them as many websites do, meaning it did not add additional random characters to make the encryption more difficult to break. After being posted in their hashed format, some of the passwords were decrypted. LinkedIn has since begun salting passwords.
According to the lawsuit, LinkedIn also relied on an outmoded hashing format to store passwords and did not adhere to "basic security checklists" supplied by the U.S. National Institute of Standards and Technology to prevent the type of attack, called a SQL injection attack, that allowed hackers to gain access.
Cameron Scott covers search, web services and privacy for The IDG News Service. Follow Cameron on Twitter at CScott_IDG.
- Healthcare organizations still too lax on security
- Why would Chinese hackers want US hospital patient data?
- About 4.5M face risk of ID theft after hospital network hacked
- Supervalu breach shows why move to smartcards is long overdue
- Grocery stores in multiple states hit by data breach
- Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
- U.S. agencies halt background checks by contractor after cyberattack
- Five unanswered questions about massive Russian hacker database
- Massive Russian hack has researchers scratching their heads
- Russian hackers amass 1.2B stolen Web credentials
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester's own market data,...
- Best Practices for Security and Compliance with Amazon Web Services This paper will discuss what part of the shared responsibility equation customers are responsible for and what some of the recommended security practices...
- Case Study: Intuit Turns to Self-Service IT Intuit empowered its users to resolve their own IT issues with a consumer-like experience to free IT to focus on more strategic initiatives....
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Legal White Papers | Webcasts