LinkedIn has confirmed that at least some of the 6.5 million encrypted passwords leaked to the Web are from active LinkedIn users. The update follows this morning’s news that a cache of passwords purportedly from LinkedIn users had appeared earlier this week on a Russian hacker website.
On the company blog, LinkedIn Director Vicente Silveira writes:
We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation and here is what we are pursuing as far as next steps for the compromised accounts:
1. Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid.
2. These members will also receive an email from LinkedIn with instructions on how to reset their passwords. There will not be any links in these emails. For security reasons, you should never change your password on any website by following a link in an email.
3. These affected members will receive a second email from our Customer Support team providing a bit more context on this situation and why they are being asked to change their passwords.
It is worth noting that the affected members who update their passwords and members whose passwords have not been compromised benefit from the enhanced security we just recently put in place, which includes hashing and salting of our current password databases.
“We sincerely apologize for the inconvenience this has caused our members. We take the security of our members very seriously,” adds Silveira.
For directions on how to reset your account with a secure password, click here.