Lax security at LinkedIn is laid bare

Advertisement
By Nicole Perlroth, The New York Times | Updated: 11 June 2012 18:51 IST
Lax security at LinkedIn is laid bare
LinkedIn is a data company that did not protect its data.

Last week, hackers breached the site and stole more than six million of its customers' passwords, which had been only lightly encrypted. They were posted to a Russian hacker forum for all to see.

That LinkedIn was attacked did not surprise anyone. Companies' computer systems are attacked every day. Indeed, the CBS music site Lastfm.com and the dating site eHarmony confirmed last week that millions of user passwords were stolen.

What has surprised customers and security experts alike is that a company that collects and profits from vast amounts of data had taken a bare-bones approach to protecting it. The breach highlights a disturbing truth about LinkedIn's computer security: there isn't much. Companies with customer data continue to gamble on their own computer security, even as the break-ins increase.

"If they had consulted with anyone that knows anything about password security, this would not have happened," said Paul Kocher, president of Cryptography Research, a San Francisco computer security firm.

Advertisement

Part of the problem may be that there are few consequences for companies with a devil-may-care attitude toward data. There are no legal penalties. Customers rarely defect. And in LinkedIn's case, its stock price actually rose in the days after the breach.

What especially concerns many people on this particular breach was that LinkedIn was not some green start-up or a company unfamiliar with data. After a highly successful initial public offering in May last year, it has piles of cash. It recruits top talent. And it makes money. It also has 160 million members who share their business connections in the hopes of making a broader and more efficient network. And they want their data to be protected.

Advertisement

"I expected better from LinkedIn," said Craig Robert Smith, a professional musician and product manager at Buzzmedia. "But I can't delete my account because it's the place to be in terms of getting recruited and networking."

It was not immediately clear how hackers were able to breach the system, how long they had been there, or if they are still poking around inside. LinkedIn does not have a chief security officer whose sole job it is to monitor for breaches. The company says David Henke, its senior vice president for operations, oversees security in addition to other roles, but Mr. Henke declined to speak for this article.

Advertisement

On a grading scale of A through F, experts say, LinkedIn, eHarmony and Lastfm.com would get, at best, a "D" for password security. The most negligent thing a company can do with users' passwords is store them in plain text. That was the case with RockYou, a gaming site that lost 30 million user passwords in a 2009 breach. The most basic step they can take to protect passwords is camouflage them with basic encryption - what is known as "hashing" - in which they mash-up a password with a mathematical algorithm and store only the encoded, or "hashed," version.

But hackers are a determined bunch. They use automated tools that can test up to a million passwords a second. To crack hashed passwords, they exploit so-called dictionaries, extensive online databases of common passwords and their precalculated hash values. Some sites contain sublists of foreign passwords - in Finnish, say - or even religious-themed passwords ("angel," "Jesus" and "God" were among the top 15 LinkedIn passwords cracked). Other hackers use "rainbow tables," which list hash values for nearly every alphanumeric character combination, up to a certain length. Some sites publish as many as 50 billion hash values.

To make hackers' jobs more difficult, diligent companies will append a series of random digits to the end of each hashed value, a process known as "salting," which requires only a few more lines of code and can be done at no cost.

Salting passwords, security experts say, is Security 101 - a basic step that LinkedIn, eHarmony and Lastfm.com all failed to take. (An A+ security grade involves hashing passwords with complex cryptographic functions, salting them, hashing the result again and storing those credentials on separate, secure Web servers where hackers cannot easily break in.)

"This isn't rocket science," Mr. Kocher said.

In a blog post after the breach, Vicente Silveira, a director with LinkedIn, said the company had invalidated passwords for compromised accounts and said members would "benefit from the enhanced security we just recently put in place, which includes hashing and salting of our current password databases."

But Julie Inouye, a spokeswoman for LinkedIn, would not say when the company started hashing and salting its passwords, or why it did not enact these security measures in the first place.

On its face, a compromised LinkedIn account - where people rarely store more than their résumé - would not appear to have broad consequences. But hackers know full well that people tend to use the same password across multiple sites and will test those passwords on Web mail, bank, corporate or brokerage firm accounts, where precious personal and financial data is free for the taking.

In this case, hackers posted a list of 6.4 million hashed passwords online and asked others to help crack them. By Thursday, some 60 percent of passwords had already been decoded. Mr. Kocher estimates that some 95 percent will eventually get cracked.

In its blog post, LinkedIn noted that the user names associated with those passwords had not been posted online, but security experts say that is probably because whoever breached its systems simply kept those for themselves.

"You don't give up the crown jewels so other people can match them up," said Jeremiah Grossman, founder and chief technology officer of WhiteHat Security.

The motivation of the hackers is apparent. But what mystifies security experts is why breaches keep happening. Mr. Grossman estimates that the cost of setting up proper password, Web server and application security for a company like LinkedIn would be a one-time cost of "a couple hundred thousand dollars." The average breach costs a company $5.5 million, or $194 for each record breached, according to a Symantec-sponsored study by the Ponemon Institute, an organization that tracks data breaches.

Mr. Kocher thinks he sees one reason in two charts he consults. One shows the number of airplane fatalities per miles flown, which decreased to one-thousandth of what it was in 1945, with the advent of the Federal Aviation Administration in 1958 and stricter security and maintenance protocols. The other, which charts the number of new computer security threats, shows the opposite. There has been a 10,000-fold increase in the number of new threats since 2002, according to data from Symantec, the antivirus firm.

The problem, Mr. Kocher and others security experts say, is a lack of liability. Computer security is not regulated and even as loads of sensitive personal, corporate and financial data gets uploaded daily, companies continue to skimp on basic protections. If 5 percent of airplanes in the United States crashed tomorrow, there would be investigations, lawsuits, a cutback in air travel and airlines' stock prices would most likely suffer. With social networks, Mr. Kocher says, "People don't vote with their feet."

LinkedIn would not say whether any members had dropped the service since the breach became public on Wednesday, but even as hackers worked diligently to crack its passwords, the company's stock rose 4 percent by the end of the week.

"Every time a plane crashes, the F.A.A. investigates and publishes the data in aggregate," Mr. Grossman said. "With breaches, there's no such thing. There's no government agency. We don't know where the bodies are buried, or how they got there."

Copyright 2012 The New York Times News Service

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 14 Price Drops to an All-Time Low on Vijay Sales
  2. Poco M7 Plus 5G Launched in India With 7,000mAh Battery at This Price
  3. Google Pixel 10 Series Price in India Reportedly Leaked Ahead of Launch
  4. Realme P4 5G Series Camera Details Revealed Ahead of Launch in India
  5. Infinix Hot 60i 5G Will Be Launched in India on This Date
  6. FASTag Annual Pass Launches This Independence Day: Here's How to Apply
  7. Flipkart Freedom Day Sale: Best Deals On Samsung Smartphones
  8. Google Pixel 10 Pro Fold Design Teased Ahead of August 20 Launch
  1. Apple Responds After Elon Musk Alleges Favourism to OpenAI, Says App Store ‘Free of Bias’: Report
  2. Asus NUC 15 Performance Mini PC With Up to Intel Core Ultra 9 CPU, Nvidia GeForce RTX 50 Series GPUs Launched
  3. Acer India Launches New Laptop Manufacturing Facility in Puducherry, Says Committed to Make in India Mission
  4. Realme P4 5G Series Camera Specifications Revealed Ahead of India Launch
  5. Vivo X300 Listings on China's Radio Certification Agency Website Hint at Imminent Launch
  6. Google Reportedly Working on Adding Support for Full-Range of Canvas Tools in Gemini’s Android App
  7. Redmi Note 15 Pro+ to Feature the Same Chipset as Last Year's Redmi Note 14 Pro+, Tipster Claims
  8. Infinix Hot 60i 5G India Launch Date Confirmed; Company Teases Key Specifications
  9. Perseid Meteor Shower 2025 to Dazzle Night Sky in August
  10. Vivo Vision Mixed Reality Headset With ‘Ultra Lightweight Design’ Set for China Launch on August 21
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.