I did get an email concerning the need to change my password when I
responded to a request to connect to someone I know fairly well this
morning. At the time I had no reason to believe that that would be a
problem.

I have been worried that there's been sort of a "contest" going on to
type in passwords and see if they match the harvested database, because
anyone tapped into the right place would be able to use those clear-text
passwords and match results to build up a very useful database.

As far as the apparent malware delivery is concerned, here's the
backtrail (if anyone wants, I'll forward the entire message for them to
analyze):

Received: from [190.40.186.225] ([190.40.186.225]) by
mail2.mousetech.com
 (8.13.8/8.13.8) with ESMTP id q5BKWN1b024788 for <[email protected]>;
Mon,
 11 Jun 2012 16:32:26 -0400
Received: from mailb-bf.linkedin.com ([216.52.242.151]) by
 mx5.biz.mail.yahoo.com; Mon, 11 Jun 2012 11:32:22 -0500
Sender: [email protected]
Date: Mon, 11 Jun 2012 11:32:22 -0500
From: LinkedIn <[email protected]>
To: timh <[email protected]>
Message-ID:
<[email protected]>
Subject: Re: Wire Transfer


On Mon, 2012-06-11 at 17:18 -0400, Andrew Leslie wrote:
> Unfortunately the passwords that were harvested in the initial attack
> were only md5 encrypted, no salt had been used which is just as good
> as using plain text nowadays. But so far I have yet to receive an
> email from them, for now. Hopefully their mail server has not been
> hijacked.
> 
> On Jun 11, 2012 5:14 PM, "Tim Holloway" <[email protected]> wrote:
>         I recently received an email with attached ZIP file concerning
>         a "wire
>         transfer" which unless I seriously misread the headers comes
>         from
>         mailb-bf.linkedin.com ([216.52.242.151]) as well as several
>         LinkedIn
>         tokens.
>         
>         I hope by now that everyone is aware that LinkedIn's security
>         system was
>         seriously compromised recently and that as a result, people's
>         encrypted
>         passwords had been posted to a public Internet site.
>         
>         Evidently the breech was more serious than has been admitted,
>         since it
>         looks like a LinkedIn mailerver has been hijacked. Which means
>         that if
>         you have changed your LinkedIn password, the new password may
>         have been
>         harvested.
>         
>         Or in other words, there is now absolutely nothing that can be
>         trusted
>         coming from (or going to) LinkedIn.
>         
>         I hope they got their Instant Delivery and Everyday Low Prices
>         on their
>         Information Technology dollars, because about the last
>         disaster of this
>         magnitude I can recall was when the magazine "Business 2.0"
>         was sunk due
>         to failure to invest in a decent set of backup systems.
>         
>         Again, until someone credible says otherwise, use LinkedIn at
>         your own
>         risk.
>         
>           Tim
>         
>         
>         ---------------------------------------------------------------------
>         Archive      http://marc.info/?l=jaxlug-list&r=1&w=2
>         RSS Feed
>         http://www.mail-archive.com/[email protected]/maillist.xml
>         Unsubscribe  [email protected]
>         



---------------------------------------------------------------------
Archive      http://marc.info/?l=jaxlug-list&r=1&w=2
RSS Feed     http://www.mail-archive.com/[email protected]/maillist.xml
Unsubscribe  [email protected]

Reply via email to