1 min read

LinkedIn Password Change Notification Randomly Sent to Previous Employers

Bogdan BOTEZATU

June 11, 2012

Promo Protect all your devices, without slowing them down.
Free 30-day trial
LinkedIn Password Change Notification Randomly Sent to Previous Employers

After the leak of roughly 6.5 million hashed passwords last week and the failed “mandatory password update for the affected account”, LinkedIn’s password reset confirmation e-mail has backfired by disclosing the reset to victim’ previous employers.

The password-reset confirmation appears to be randomly sent to a number of e-mail addresses the user is likely connected with. Based on our observations, these notifications are sent to e-mail accounts with current or previous employers – even if these e-mail addresses have never been associated with the LinkedIn account.

Example: Password reset notification for a user, sent to qscan@bitdefender. The Quick Scan account has never been associated with LinkedIn in any way.

The service notifies the user at e-mail addresses he or she doesn’t control allegedly to minimize phishing attacks following the leak of the hashed passwords. Although the LinkedIn message doesn’t mention the username, password or other identification for the user’s account, this alleged security feature counts as unnecessary disclosure of activity that may actually work against the user by informing third parties of his or her whereabouts.

We have notified LinkedIn about the issue.

tags


Author


Bogdan BOTEZATU

Bogdan is living his second childhood at Bitdefender as director of threat research.

View all posts

You might also like

Bookmarks


loader