A partial list of the 6.5 million passwords leaked by someone identified as dwdm. The list contains strong passwords that were unique to LinkedIn, leading to speculation that's were the passwords originated.
Dan Goodin, Ars Technica
An unknown hacker has posted more than 8 million cryptographic hashes to the Internet that appear to belong to users of LinkedIn and a separate, popular dating website.
The massive dumps over the past three days came in postings to user forums dedicated to password cracking at insidepro.com. The bigger of the two lists contains almost 6.46 million passwords that have been converted into hashes using the SHA-1 cryptographic function. They use no cryptographic "salt," making the job of cracking them considerably faster. Rick Redman, a security consultant who specializes in password cracking, said the list almost certainly belongs to LinkedIn because he found a password in it that was unique to the professional social networking site. Robert Graham, CEO of Errata Security said much the same thing
, as did researchers from Sophos
. Several Twitter users
reported similar findings.
"My [LinkedIn] password was in it and mine was 20 plus characters and was random," Redman told Ars. With LinkedIn counting more than 160 million registered users
, the list is probably a small subset, most likely because the person who obtained it cracked the weakest ones and posted only those he needed help with.