{"id":7549,"date":"2011-06-02T19:57:23","date_gmt":"2011-06-02T23:57:23","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=7549"},"modified":"2021-07-18T19:33:04","modified_gmt":"2021-07-18T23:33:04","slug":"linkedin-accounts-can-be-hijacked","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/linkedin-accounts-can-be-hijacked\/","title":{"rendered":"LinkedIn Accounts can be Hijacked"},"content":{"rendered":"<p><em><a href=\"https:\/\/fileshare-acho.blogspot.com\/2011\/02\/list-of-websites-to-trace-your-stolen.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-110239\" title=\"LinkedIn Accounts can be Hijacked\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft-7-e1571615945866-100x150.png?resize=73%2C110&#038;ssl=1\" alt=\"\" width=\"73\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft-7-e1571615945866.png?resize=100%2C150&amp;ssl=1 100w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft-7-e1571615945866.png?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft-7-e1571615945866.png?w=294&amp;ssl=1 294w\" sizes=\"auto, (max-width: 73px) 100vw, 73px\" \/><\/a><\/em><a title=\"www.net-security.org\" href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> has a report that users of the <a title=\"www.latimes.com\" href=\"http:\/\/latimesblogs.latimes.com\/technology\/2011\/05\/linkedin-ipo-skyrockets-trades-for-as-much-as-9299-a-share.html\" target=\"_blank\" rel=\"noopener noreferrer\">newly minted<\/a> public <a href=\"http:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> (<a title=\"NYSE : LKND\" href=\"https:\/\/www.investopedia.com\/news\/linkedin-delist-nyse-dec-19-lnkd-msft\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNKD<\/a>) are in danger of having their account hijacked. The Linkedin accounts can be hacked when accessing them over insecure <a title=\"Wi-Fi\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Wi-Fi\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Wi-Fi<\/a> networks or public computers. Independent security researcher Rishi Narang told <em>Help Net Security<\/em> that the risk is due to two reasons. First, the LinkedIn session and <a title=\"Authentication\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/HTTP_cookie\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">authentication<\/a> <a title=\"HTTP cookie\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/HTTP_cookie\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">cookies<\/a> have an unnaturally long lifespan. Secondly, <a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">LinkedIn<\/a> does not remove the cookies once the user logs out.<\/p>\n<p><a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-7645\" style=\"border: 0px none; margin-left: 2px; margin-right: 2px;\" title=\"linkedin_ICON\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/05\/linkedin_ICON.jpg?resize=91%2C91&#038;ssl=1\" alt=\"LinkedIn\" width=\"91\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/05\/linkedin_ICON.jpg?w=256&amp;ssl=1 256w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/05\/linkedin_ICON.jpg?resize=150%2C150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 91px) 100vw, 91px\" \/><\/a>The article says the cookies in question are <a title=\"Session (computer science)\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Session_%28computer_science%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">JSESSIONID<\/a> and LEO_AUTH_TOKEN, and are available even after the session initiated by the user has been terminated. The cookies are also set to expire only after one solid year, and this fact allowed the researcher to get access to a number of active accounts of various people from all over the world during a period of many months. &#8220;They would have login\/logged out many times in these months but their cookie was still valid,&#8221; Mr.Narnag writes on his <a title=\"www.wtfuzz.com\" href=\"http:\/\/web.archive.org\/web\/20140325231801\/http:\/\/www.wtfuzz.com\/blogs\/linkedin-ssl-cookie-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>.<\/p>\n<p>In addition to all of that, those two cookies and the others that the welcome page stores are transmitted in <a title=\"Plaintext\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Plaintext\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">clear text<\/a> over <a title=\"Hypertext Transfer Protocol\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Hypertext_Transfer_Protocol\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">HTTP<\/a>, because they don&#8217;t have a secure flag set. &#8220;If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic,&#8221; explains Mr. Narang.<\/p>\n<p>According to the researcher, until LinkedIn makes some changes, the only way to &#8220;expire&#8221; the cookies is for the users to change their password and then authenticate themselves with the new credentials. This could be a stopgap measure if you know that someone has stolen those cookies and is accessing your account, but won&#8217;t new cookies be created after the password change and authentication?<\/p>\n<p><em>Help Net Security <\/em>says that the only solution to this problem is for LinkedIn to effect some changes, and <a title=\"Reuters\" href=\"https:\/\/web.archive.org\/web\/20140814021256\/http:\/\/www.reuters.com\/article\/2011\/05\/22\/linkedin-security-idUSN2212591020110522\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <a title=\"Reuters\" href=\"http:\/\/www.reuters.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Reuters<\/em><\/a>, they are planning to offer &#8220;opt-in&#8221; <a title=\"Transport Layer Security\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Transport_Layer_Security\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SSL<\/a> support for the entire site in the coming months (and that would encrypt the cookies in questions), but have not commented on the cookies have such a long lifespan.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.pcworld.com\/article\/228917\/dangers_of_ie_cookiejacking_what_you_need_to_know.html\" target=\"_blank\" rel=\"noopener noreferrer\">Dangers of IE &#8216;Cookiejacking&#8217;: What You Need to Know<\/a> (pcworld.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a href=\"https:\/\/wp.me\/P2wgaW-3H\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a href=\"https:\/\/www.linkedin.com\/in\/rb48334\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users of LinkedIn are in danger of having their account hijacked when accessing it over insecure Wi-Fi networks or public computers<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[295],"tags":[3045,1484,104,1096,536,92,1796,317,696,1913,1878,305,583,60,579],"class_list":["post-7549","post","type-post","status-publish","format-standard","hentry","category-social-networking","tag-3045","tag-cookies","tag-facebook","tag-fb","tag-goog","tag-google","tag-http","tag-linkedin","tag-lnkd","tag-network","tag-social","tag-ssl","tag-tls","tag-twitter","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=7549"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7549\/revisions"}],"predecessor-version":[{"id":131360,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7549\/revisions\/131360"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=7549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=7549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=7549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}