Task 1 of 4

117 Million Passwords — Sold for $2,200

In 2012, LinkedIn was breached. The attackers stole 117 million email and password combinations. LinkedIn's security team initially said the passwords were "hashed" — technically true, but they were hashed with MD5 without salt, which is as close to plaintext as it gets.

In 2016 — four years later — those 117 million records appeared for sale on a dark web marketplace for 5 bitcoin ($2,200 at the time). Within days, the hashes were cracked. Tools like hashcat can test billions of MD5 guesses per second on a modern GPU. Common passwords fell in milliseconds.

WHY MD5 FAILED
LinkedIn used MD5
password → 5f4dcc3b5aa765d6...
password → 5f4dcc3b5aa765d6...
Same input = same hash. Rainbow table has this precomputed. Cracked instantly.
Should have used bcrypt
password → $2b$12$LQv3c1yq...
password → $2b$12$9tXe3fHs...
Same input = different hash (salt). Each one must be cracked individually. Designed to be slow.

The same LinkedIn credentials were then used in credential stuffing attacks against hundreds of other services — Dropbox, Netflix, Spotify. People reuse passwords. One poorly protected database becomes a skeleton key.

LinkedIn also delayed notifying users for four years. By the time most people knew their password had been exposed, attackers had been using it for years.

1

LinkedIn hashed passwords with MD5. Why were the hashes cracked so easily?

2

After a password database is leaked, attackers try those credentials on other sites. What is this attack called?

Answer all 2 questions to continue