LinkedIn has admitted that the 2012 hack was significantly worse than previously thought since the new data dump emerged.
The company has advised all members to change their passwords as they take steps to contact members whose data has been compromised and invalidate the passwords of affected accounts.
Hackers gained access to the site in 2012 and posted 6.5 million encrypted passwords on a Russian hacker forum, but email addresses were not included in that dump.
The passwords f-rom both releases were encrypted with “no salt,” making them easier to crack.
A salt is a random number that is needed to access encrypted data, along with a password.
READ MORE:‘Fireme’: Leaked LinkedIn passwords reveal dubious job satisfaction
The hacker who released the data goes by the name of Peace. He is selling the information on a Darknet marketplace called The Real Deal for 5 bitcoin (around $2,200), according to Motherboard.
The search engine LeakedSource, which sells hacked data, also claims to have obtained the contents of the data dump, and asks affected users to contact them if they wish to be removed f-rom their list.
Both LeakedSource and Peace claim that there are 167 million accounts in the hacked database, 117 million of those include both emails and encrypted passwords, Motherboard reports.
Security researcher Troy Hunt told Motherboard that he had spoken with some of the users affected by the leak.A $5 million lawsuit was filed against Linkedin in the wake of the 2012 hack, blaming the company for its outdated security measures.
LinkedIn reminded users in its Wednesday statement that it now salts every password and urged members to use two-factor authentication.