Please forward me the message.
On Jun 11, 2012 5:28 PM, "Tim Holloway" <[email protected]> wrote:

> I did get an email concerning the need to change my password when I
> responded to a request to connect to someone I know fairly well this
> morning. At the time I had no reason to believe that that would be a
> problem.
>
> I have been worried that there's been sort of a "contest" going on to
> type in passwords and see if they match the harvested database, because
> anyone tapped into the right place would be able to use those clear-text
> passwords and match results to build up a very useful database.
>
> As far as the apparent malware delivery is concerned, here's the
> backtrail (if anyone wants, I'll forward the entire message for them to
> analyze):
>
> Received: from [190.40.186.225] ([190.40.186.225]) by
> mail2.mousetech.com
>  (8.13.8/8.13.8) with ESMTP id q5BKWN1b024788 for <[email protected]>;
> Mon,
>  11 Jun 2012 16:32:26 -0400
> Received: from mailb-bf.linkedin.com ([216.52.242.151]) by
>  mx5.biz.mail.yahoo.com; Mon, 11 Jun 2012 11:32:22 -0500
> Sender: [email protected]
> Date: Mon, 11 Jun 2012 11:32:22 -0500
> From: LinkedIn <[email protected]>
> To: timh <[email protected]>
> Message-ID:
> <[email protected]>
> Subject: Re: Wire Transfer
>
>
> On Mon, 2012-06-11 at 17:18 -0400, Andrew Leslie wrote:
> > Unfortunately the passwords that were harvested in the initial attack
> > were only md5 encrypted, no salt had been used which is just as good
> > as using plain text nowadays. But so far I have yet to receive an
> > email from them, for now. Hopefully their mail server has not been
> > hijacked.
> >
> > On Jun 11, 2012 5:14 PM, "Tim Holloway" <[email protected]> wrote:
> >         I recently received an email with attached ZIP file concerning
> >         a "wire
> >         transfer" which unless I seriously misread the headers comes
> >         from
> >         mailb-bf.linkedin.com ([216.52.242.151]) as well as several
> >         LinkedIn
> >         tokens.
> >
> >         I hope by now that everyone is aware that LinkedIn's security
> >         system was
> >         seriously compromised recently and that as a result, people's
> >         encrypted
> >         passwords had been posted to a public Internet site.
> >
> >         Evidently the breech was more serious than has been admitted,
> >         since it
> >         looks like a LinkedIn mailerver has been hijacked. Which means
> >         that if
> >         you have changed your LinkedIn password, the new password may
> >         have been
> >         harvested.
> >
> >         Or in other words, there is now absolutely nothing that can be
> >         trusted
> >         coming from (or going to) LinkedIn.
> >
> >         I hope they got their Instant Delivery and Everyday Low Prices
> >         on their
> >         Information Technology dollars, because about the last
> >         disaster of this
> >         magnitude I can recall was when the magazine "Business 2.0"
> >         was sunk due
> >         to failure to invest in a decent set of backup systems.
> >
> >         Again, until someone credible says otherwise, use LinkedIn at
> >         your own
> >         risk.
> >
> >           Tim
> >
> >
> >
> ---------------------------------------------------------------------
> >         Archive      http://marc.info/?l=jaxlug-list&r=1&w=2
> >         RSS Feed
> >         http://www.mail-archive.com/[email protected]/maillist.xml
> >         Unsubscribe  [email protected]
> >
>
>
>

Reply via email to