Linkedin Leaked Passwords List Download

I recently started to receive several emails, from various outlook.com accounts, attempting to blackmail me into paying a large sum of money through bitcoins. At first, I was startled, as they seemingly knew my password and this password was truly something I had been using. Luckily, I know that this password has not been in use for quite a while, so I started investigating what really was happening. Using the page: haveibeenpwned.com I know my passwords has previously been leaked in various security breaches and that this particular password was something I used on LinkedIn around 5 years ago. According to haveibeenpwned my LinkedIn password was leaked in 2012:

In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later.

So in a sense, it is no surprise that someone has that password as it is now more or less public knowledge. In the email text below there several technical giveaways that shows the phishing mail is generated by a computer and not the personal attack it tries to indicate:

May 24, 2016  So, to reiterate: If you had a LinkedIn account in 2012, change the password now, and make the password something you CAN'T remember. Write it down on a.

  • My personal computer has no webcam
  • It runs Linux and does not initiate RDP (Windows Remote Desktop technology) connections without extra software packages, root access, and configuration.
  • I have received the same mail with slight variations 4 times from different senders (with disposable outlook emails) with 4 different amounts to be paid which indicates that this definitely not a personal attack, but a scripted setup.

Should I be scared and what should I do?

No, you should not be scared. It is seemingly a scripted mail sent to millions of leaked password owners and not actual personal attacks. On the other hand, your password was leaked (albeit a long time ago), so this should be concerning and a reason to change this password if it is used in any other website.

The reason I am writing this post is to make sure that no one sends money to the perpetrators. It is a scam and while it is quite scary with the leaked password it is still just a scam. They have a huge list of 164 million emails and passwords and just needs to mail them all a seemingly personal attack. If just a fraction of these complies with their demands they will be quite rich. Alarmingly, while researching for this post I found that several of the posted bitcoin addresses online from victims of similar blackmail had large transfers in the last couple of days, so unfortunately some people are falling for their tricks. You can check the bitcoin addresses on the site blockexplorer.com and see if anything has been transferred so far. Banana pi format emmc.

If anything the attempted blackmail should be a good reason to go over your online security and make sure that it is up to date. My personal recommendations are:

  • Use 2-step verification whenever possible – this makes it much harder for perpetrators to gain access by only knowing the password.
  • Use a password manager, either online or locally as KeePassXC. This way only one very strong password is needed.
  • Use different passwords on all sites. This limit the damage is a password is leaked which happens quite regularly.
  • Avoid security questions or at least do not answer them using publicly available knowledge. I usually give my first pet name a randomly generated password that I store in my password manager, see this article for more background: https://auth0.com/blog/are-your-security-questions-as-safe-as-you-think/

Mail text

.. is your Password and I'm going to cut to the chase. You do not know me whereas I know you very well and you're probably thinking why are you getting this mail, right?

I actually setup malware on porn video clips (adult porn) & guess what, you visited same porn website to experience fun (you know what I mean). When you were busy watching video clips, your device initiated functioning as a RDP (Remote Desktop) that has a keylogger which gave me access to your device and also your web cam controls. Immediately after that, my malware collected your complete contacts from messenger, social networks, and mailbox.

What have I done?

It's simply your hard luck that I saw your blunder. Next, I invested in more time than I should've digging into your data and made a two screen sextape. 1st half shows the recording you had been watching and other half shows the view of your web camera (it is you doing naughty things). In good faith, I am ready to destroy all information about you and let you continue with your daily life. And I will give you two options that can accomplish your freedom. Those two choices are to either disregard this letter (bad for you and your family), or pay me $1000.

Exactly what should you do?

Let’s explore those 2 options in details. First Alternative is to disregard this e mail. Let's see what is going to happen if you take this option. I definitely will send your sextape to all your contacts including members of your family, coworkers, and so on. It will not save you from the humiliation your self will face when relatives and buddies discover your sordid videotape. Second Option is to pay me $1000. We will name this my “privacy fee”. Now Lets see what happens if you go with this path. Your secret remains your secret. I'll erase the sextape. Once you send the payment, You can freely continue on with your daily life and family that none of this ever occurred. You will make the transfer by Bitcoins (if you do not know how just type 'how to buy bitcoin' in google)

Download

BTC ADDRESS IS: 1HGfT6VLTveTzumGyK1Ppi5KMdH95RcH6L

(It's CASE SENSITIVE, copy and paste it)

Notice: You have one day to make the payment. (I've a unique pixel in this e mail, and now I know that you have read this message). You shouldn't explain no person what you will be utilizing the Bitcoins for or they might not provide it to you. The task to get bitcoins will take a short time so do not wait. If I do not get the Bitcoin, I will certainly send your videotape to all of your contacts including family members, coworkers, and many others. nevertheless, if I do get paid, I'll destroy the sextape immediately. If you want to have evidence, reply with 'yes!' and I will certainly send out your sextape to your 15 contacts. It is a non-negotiable offer, thus kindly don't ruin my personal time and yours by replying to this e mail.

In fact, it's been such a success that their most recent movie, Avengers: Endgame, holds the record as the highest-grossing movie of all time after passing Avatar which had held the record since 2009.Universal Studios even tried to create a 'dark universe' with all of their classic monsters like Frankenstein, the Mummy, and the Invisible Man but they scrapped those plans after their Mummy reboot with Tom Cruise bombed in 2017. Old time radio microphones. If anyone listening thinks I'm crazy for not noticing this before, please let me know of other episodes that do the same thing. I personally find that disappointing as I loved the 1999 reboot with Brendan Fraiser and Rachel Weisz and I was excited to see a world where all those characters interacted with one another.Now, while it's not uncommon to see this happen in today's pop culture, I'd never heard an example of it on the radio.

Further reading


  1. http://bit.ly/meganz_file TO GET UNLIMITED NUMBER OF PREMIUM DATA
  2. http://bit.ly/meganz_file TO GET UNLIMITED NUMBER OF PREMIUM DATA
  3. Bonus: http://bit.ly/2nYWFqu
  4. This leak includes 418.128.998 records.
  5. Just open up the databases in your favorite text editor and Ctrl + F for the email you want to hack.
  6. Proof of content 100 lines of records from the DB.
  7. tkircher@mentor4inc.com:walker
  8. michele@radiatepr.com:sydney
  9. esteban.erize@samsistemas.com.ar:campana3
  10. tobygoldblatt@yahoo.co.uk:bananna
  11. alexander.artope@gmail.com:julian85
  12. jamesbuckle@yahoo.com:sunshine
  13. mounia.popovic@gmail.com:Benamar
  14. fabernjudd@comcast.net:itsasecret
  15. acritchett@one-economy.com:lovelove
  16. william@objecthouse.com:kenufa
  17. sharting@onfuego.com:success
  18. markd@borkware.com:fnord23
  19. d.h.elzinga@freeler.nl:siepmaus
  20. masont@gtlaw.com:gorham
  21. venema@vhu.de:poespoes
  22. dcalao@modernelectric.com:bigd5576
  23. jaimerebecca@gmail.com:horatio
  24. lainie.coplan@cbeyond.net:pink82
  25. sarah.ambrose@hmhpub.com:whitney1
  26. ppy1@cornell.edu:denguyen
  27. Itai.Frieberger@888holdings.com:01360136
  28. andrew@andrewrobertson.com:qwerty
  29. posnerlj@comcast.net:larisa
  30. francois.granger@gmail.com:edcrfv
  31. borism@iqmetrix.com:vlad2171
  32. jrusoff@mac.com:nagual
  33. david@peerplus.com:8lunch
  34. trakwebster@traktor.com:poot2077
  35. lionel.jean@gemplus.com:bonsamis
  36. jokir@earthlink.net:sadie1
  37. linkedin@matthewburgess.com:shogun
  38. avachat@hotmail.com:abhay19
  39. behlov@yahoo.com:upgrades
  40. pchaynes1063@gmail.com:roadking
  41. simone@evectors.it:nideknil
  42. yumihosaka@yahoo.com:chococookie
  43. jeff.snyder@wdc.com:annabear
  44. janet.wong@smgunited.com:selena
  45. rerb@analysts.com:superb
  46. gareth@covercian.co.uk:w0lfgang
  47. abewashington@gmail.com:mazamaza
  48. lstarr65@hotmail.com:wabbit
  49. scporfirio@hotmail.com:sp007865
  50. aida.marcial@exitsouth.com:pebbles_1
  51. Danizao.cruz@gmail.com:Caxcas
  52. irenakun@yahoo.com:steinke
  53. asharma05@gsb.columbia.edu:4success
  54. brett.hopcroft@linklaters.com:springbokkie
  55. Abigail_Caspar@cable.comcast.com:lewis123
  56. http://bit.ly/meganz_file
  57. Bonus: http://bit.ly/2nYWFqu
  58. Tags (ignore):
  59. siph0n Database (@datasiph0n) linkedin
  60. The latest Tweets from siph0n Database (@datasiph0n). Leaks Archive Database @@@@@@@ Escrow Marketplace @@@@@@@@@ Semi Automated ..
  61. You've visited this page 2 times. Last visit: 11/10/16
  62. siph0n Database on Twitter: '#database #leaked #hacked Databases ..
  63. https://twitter.com/datasiph0n/status/731217840032890880
  64. Jun 18, 2016 - @datasiph0n. Leaks Archive Database @@@@@@@ Escrow Marketplace .. #database #leaked #hacked Databases For Download.
  65. siph0n Database on Twitter: '#database #leaked #hacked linkedin..
  66. https://twitter.com/datasiph0n/status/738918729703100416
  67. Jun 18, 2016 - Leaks Archive Database @@@@@@@ Escrow Marketplace @@@@@@@@@ Semi Automated Twitter @@@@@@@. Joined February ..
  68. https://www.leakedsource.com/blog/linkedin
  69. Jun 18, 2016 - linkedin credentials are being traded in the tens of millions on the dark web. .. If we come across a leaked database from a company that most people haven't heard of, we .. Clearly Russian consumers download bad things.
  70. How to Check If Your linkedin Password Has Leaked & What to Do Next
  71. www.makeuseof.com/tag/linkedin-hack-not-title-article/
  72. Jun 18, 2016 - Apparently over 159 Million linkedin accounts and passwords have been .. The leak was detected by LeakedSource, a new database of over 1.8 ..
  73. Someone is selling 159 Million linkedin passwords on the dark web
  74. mashable.com/2016/11/10/linkedin-password-leak/http://pastebin.com/u/DBleaker
  75. Jun 18, 2016 - linkedin says its systems haven't been breached, but the passwords appear to .. but what's odd about this leak is that the passwords aren't encrypted at all. .. its linkedin database if your password (on any site, not just linkedin) ..
  76. 159 Million linkedin Passwords May Have Been Hacked and Leaked
  77. thehackernews.com/2016/07/hack-linkedin-password.html
  78. Jun 18, 2016 - 159 Million linkedin Passwords May Have Been Hacked and Leaked .. So, one possibility could also be that the alleged linkedin database dump of ..
  79. Login Details of 159 Million linkedin Accounts Leaked Online Time to ..
  80. www.socialmediatoday.com/../login-details-24-million-linkedin-accounts-leaked-online..
  81. Jun 18, 2016 - Login Details of 48 Million linkedin Accounts Leaked Online Time to .. (If you're interested, you can actually search the database for any ..
  82. linkedin: Passwords Leaked for Millions of Accounts
  83. www.wsj.com/../linkedin-millions-of-accounts-at-risk-of-breach-1..The Wall Street Journal
  84. Jun 18, 2016 - linkedin has notified millions of users that their accounts are at risk of being .. The database is the latest in a string of leaks in the past month ..
  85. Passwords for 159M linkedin accounts may have been hacked and ..
  86. Jun 18, 2016 - linkedin says that its systems have not been breached. .. on its @Support account that it is auditing its data against recent database dumps. .. Whether or not the leaked linkedin credentials are authentic, it never hurts to change ..
  87. Searches related to linkedin database leak download
  88. linkedin leaked source free account
  89. linkedin email password
  90. linkedin email:pass leak
  91. leaked linkedin passwords pastebin
  92. linkedin email password dump
  93. linkedin database download
  94. DATABASE , HACKED, LEAKED , COMBOLIST , EMAIL:PASS , COMBO ,
  95. EMAIL:PASSWORD ,TWITTER , OVH , HACKED , HAXOR , HACKER , LEAK ,
  96. LINKEDIN , TUMBLR , HACKED DATABASE , LEAKED DATABASE , HQ COMBO,
  97. T-MOBILE , EXPERIAN , DBOX DB , DROPBOX , DROPBOX DATABASE, CLIXSENSE ,
  98. CLIXSENSE DATABASE , HQ ACCOUNTS , FRESH COMBO , EMAIL:PASS FRESH ,
  99. DATABASE LEAKED , SPOTIFY , HBO NOW , NETFLIX , UBER ACCOUNTS , UBER ,
  100. NETFLIX ACCOUNT , HBO NOW ACCOUNT , SPOTIFY ACCOUNT , MINECRAFT ACCOUNT ,
  101. LOL ACCOUNT , EUNE , EUNE ACCOUNT , RP EUNE ACCOUNT , CHEAP SPOTIFY PREMIUM ,
  102. ZENMATE ACCOUNT , DEATH BY CAPTCHA ACCOUNT , ZENMATE , RISEUP INVITE ,
  103. RISEUP.NET INVITE, INVITE CODE , MINECRAFT , CRACKED PROGRAMS
  104. The world came to know about massive data breaches in some of the most popular social media websites including LinkedIn, MySpace, Tumblr, linkedin, and VK.com when an unknown Russian hacker published the data dumps for sale on the underground black marketplace.
  105. However, these are only data breaches that have been publicly disclosed by the hacker.
  106. I wonder how much more stolen data sets this Russian, or other hackers are holding that have yet to be released.
  107. The answer is still unknown, but the same hacker is now claiming another major data breach, this time, in linkedin.
  108. Login credentials of more than 159 Million users are now being sold on the dark web marketplace for 10 Bitcoins (over $5,800).
  109. LeakedSource, a search engine site that indexes leaked login credentials from data breaches, noted in a blog post that it received a copy
  110. of the linkedin database from Tessa88, the same alias used by the hacker who provided it hacked data from Russian social network VK.com last week.
  111. The database includes usernames, email addresses, sometimes second email addresses, and plain-text passwords for more than 159 Million linkedin accounts.http://pastebin.com/u/DBleaker
  112. linkedin strongly denied the claims by saying that 'these usernames and credentials were not obtained by a linkedin data breach' their 'systems have not been breached,' but LeakedSource believed that the data leak was the result of malware.
  113. 'Tens of millions of people have become infected by malware, and the malware sent every saved username and password from browsers like Chrome and Firefox back to the hackers from all websites including Twitter,' LeakedSource wrote in its blog post.
  114. But, do you remember how Facebook CEO Mark Zuckerberg Twitter account was compromised?
  115. The hackers obtained Zuck's account credentials from the recent LinkedIn data breach, then broke his SHA1-hashed password string, tried on his several social media accounts and successfully hacked Zuckerbergs Twitter and Pinterest account.
  116. So, one possibility could also be that the alleged linkedin database dump of over 159 Million users is made up of already available records from the previous LinkedIn, MySpace and linkedin data breaches.
  117. The hacker might just have published already leaked data from other sites and services as a new hack against linkedin that actually never happened.
  118. Whatever the reason is, the fact remain that hackers may have had their hands on your personal data, including your online credentials.
  119. So, its high time you changed your passwords for all social media sites as well as other online sites if you are using the same password.