{"id":17305,"date":"2012-06-06T19:50:03","date_gmt":"2012-06-06T23:50:03","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-13T20:22:22","modified_gmt":"2021-07-14T00:22:22","slug":"bad-day-at-linkedin","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/bad-day-at-linkedin\/","title":{"rendered":"Bad Day at LinkedIn"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-97918\" title=\"Bad Day at LinkedIn\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/burglar.jpg?resize=73%2C73&#038;ssl=1\" alt=\"Bad Day at LinkedIn\" width=\"73\" height=\"73\" \/>It&#8217;s been a <strong>bad day for <a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a><\/strong> (<a title=\"NYSE : LNKD\" href=\"https:\/\/www.investopedia.com\/news\/linkedin-delist-nyse-dec-19-lnkd-msft\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNKD<\/a>). LinkedIn users have been the victim of<strong> two security and privacy blunders on the same day.<\/strong> First, the <a title=\"LinkedIn mobile app for iOS devices\" href=\"http:\/\/itunes.apple.com\/us\/app\/linkedin\/id288429040?mt=8\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn <strong>mobile app<\/strong> for iOS devices<\/a>\u00a0is sending potentially confidential private and business information to the company servers without the users&#8217; knowledge.<\/p>\n<p><em><a href=\"http:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97920 \" title=\"LinkedIn logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_linkedin.png?resize=125%2C30&#038;ssl=1\" alt=\"LinkedIn logo\" width=\"125\" height=\"30\" \/><\/a>Help Net Security<\/em> <a title=\"LinkedIn privacy fail\" href=\"https:\/\/web.archive.org\/web\/20140622103740\/http:\/\/www.net-security.org:80\/secworld.php?id=13050\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that security researchers Yair Amit and Adi Sharabani at <a title=\"Skycure Security\" href=\"https:\/\/web.archive.org\/web\/20130911023334\/http:\/\/blog.skycure.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">Skycure Security<\/a>\u00a0identified the <a title=\"Vulnerability (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Vulnerability_%28computing%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\"><strong>security hole<\/strong><\/a>. According to the researchers, the security flaw involves calendar syncing which collects data from all the calendars (private and corporate) on the <a title=\"IOS\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS<\/a> device.<\/p>\n<p>&#8220;The app doesn\u2019t only send the participant lists of meetings; it also sends out the subject, location, time of meeting and more importantly personal meeting notes, which tend to contain highly sensitive information such as conference call details and passcodes,&#8221; the researchers point out in the article. &#8220;&#8230;this information is collected and transmitted to LinkedIn\u2019s servers; moreover, this action is currently performed without a clear indication from the app to the user, thus possibly violating <a title=\"Apple\" href=\"http:\/\/www.apple.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Apple\u2019s<\/a> privacy guidelines.&#8221;<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97923 size-medium\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/HeadInSand.jpg?resize=112%2C150&#038;ssl=1\" alt=\"\" width=\"112\" height=\"150\" \/>The <strong>first response from LinkedIn<\/strong>&#8216;s spokeswoman Nicole Perlroth appears to <strong>minimize the issue<\/strong> and <strong>blame the users<\/strong> for the privacy breach when she told <em>Help Net Security<\/em> that the feature is opt-in, and said nothing about whether the company will update the app that would stop this privacy snafu from happening in the future. (<em>Looks like LinkedIn updated the App and broke it according to reviews in the Apple AppStore<\/em>) This was reinforced by Joff Redfern, Mobile Product Head at LinkedIn on the <a href=\"http:\/\/blog.linkedin.com\/2012\/06\/06\/mobile-calendar-feature\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn blog<\/a> where he also pointed out the information harvesting app is an opt-in feature. He <strong>claims that the information collected is not stored or shared<\/strong>. LinkedIn did change the LinkedIn app for <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) Android so it no longer sends data from Droids to LinkedIn. There was no information in the article if LinkedIn plans to change the Apple iOS app.<\/p>\n<p>But wait it gets worse&#8230;<\/p>\n<p><strong>LinkedIn also lost 6.5 million accounts<\/strong> today. They were however <strong>found on a Russian forum<\/strong>. LinkedIn has confirmed on their <a href=\"http:\/\/blog.linkedin.com\/2012\/06\/06\/linkedin-member-passwords-compromised\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a> that there are &#8220;<strong>compromised accounts<\/strong>.&#8221; Cameron Camp, Security Researcher at <a title=\"ESET\" href=\"http:\/\/www.eset.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">ESET<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20121016081529\/http:\/\/www.net-security.org:80\/secworld.php?id=13053\" target=\"_blank\" rel=\"noopener noreferrer\">commented<\/a> on the leak for <em>Help Net Security<\/em>:<\/p>\n<p>&#8220;The difference with this hack &#8230; is that <strong>people put their REAL information about themselves<\/strong> professionally on the site not just what party they plan on attending, ala <a title=\"Facebook\" href=\"https:\/\/facebook.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Facebook<\/a> and others &#8230;\u00a0 mess with somebody\u2019s professional profile, and you\u2019re messing with their life, and their contacts know about it.&#8221;<\/p>\n<p><em><strong>rb-<\/strong><br \/>\n<\/em><\/p>\n<p><em>I wrote about the value of different credentials<\/em><em> <a href=\"https:\/\/wp.me\/p2wgaW-1kX\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> and <a href=\"https:\/\/wp.me\/p2wgaW-Do\" target=\"_blank\" rel=\"noopener noreferrer\">here.<\/a><\/em><\/p>\n<p><em>I am wondering about the timing of the two security problems for Linke<\/em><em>dIn. Could they be related? Were <\/em><em>attackers using the <\/em><em>Apple iOS app as an attack vector? After all, we know that Apple loves to collect personal info on its customers.<\/em><\/p>\n<div id=\"attachment_97926\" style=\"width: 166px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.salon.com\/2012\/04\/04\/mitt_romneys_fooling_himself_about_women\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-97926\" class=\"wp-image-97926 \" title=\"Mitt Romney\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/romney_confused-e1563417322439-150x106.jpg?resize=156%2C110&#038;ssl=1\" alt=\"Mitt Romney\" width=\"156\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/romney_confused-e1563417322439.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/romney_confused-e1563417322439.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/romney_confused-e1563417322439.jpg?w=568&amp;ssl=1 568w\" sizes=\"auto, (max-width: 156px) 100vw, 156px\" \/><\/a><p id=\"caption-attachment-97926\" class=\"wp-caption-text\"><em>What happened here?<\/em><\/p><\/div>\n<p><em><strong>Action Items:<\/strong><\/em><\/p>\n<ul>\n<li><em>Toggle off the \u201cAdd Your Calendar\u201d option in the Sync Calendar feature of the LinkedIn app on your Apple iOS devices<\/em><\/li>\n<li><em><span id=\"intelliTxt\">Immediately change your LinkedIn password and any accounts that share the same password.<\/span><\/em><\/li>\n<li><em><span id=\"intelliTxt\">Be on the lookout for phishing campaigns that might leverage the incident.<\/span><\/em><\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/06\/06\/change-your-linkedin-password-immediately-dont-worry-about-linkedins-calendar-sync\/\" target=\"_blank\" rel=\"noopener noreferrer\">Change Your LinkedIn Password Immediately. Don&#8217;t Worry About LinkedIn&#8217;s Calendar Sync.<\/a>(forbes.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LinkedIn lost 6.5 million accounts that were found on a Russian forum LNKD has confirmed there are compromised accounts<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,420,101,125,104,1096,536,1280,1135,317,696,4,1878],"class_list":["post-17305","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-aapl","tag-apple","tag-data-breach","tag-facebook","tag-fb","tag-goog","tag-information-sensitivity","tag-ios","tag-linkedin","tag-lnkd","tag-security","tag-social"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=17305"}],"version-history":[{"count":11,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17305\/revisions"}],"predecessor-version":[{"id":132794,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17305\/revisions\/132794"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=17305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=17305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=17305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}