LinkedIn Data Breach
LinkedIn Professional Network Data Scrape (2021): 400 Million Public Profile Records Including Phone, Job Title & Home Address Sold Online
Professional networking platform.
Risk Interpretation
High risk of spearphishing, impersonation, and business relationship mapping. Employment and network data make targeted scams, executive targeting, and BEC-style attacks much more effective.
Impact & Downstream Threats
The 2021 LinkedIn incident is best described as a large scraping event, not a conventional internal system breach. Public reporting from HIBP says attackers scraped data from hundreds of millions of public profiles and monetized it later, while LinkedIn’s public position was that the dataset was an aggregation of data from multiple sources and did not expose private member account data. Even so, the exposure was still significant because it packaged names, emails, job titles, locations, and rela
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
- Employment-based social engineering using job and employer data
- Social media account targeting and impersonation
Threat Vectors
Breach Intelligence
Executive Summary
LinkedIn suffered one of the largest professional profile exposures on record when attackers scraped data from approximately 400 million user accounts in early 2021 and sold the aggregated dataset on hacker forums. The incident was not a conventional database breach. Instead, attackers harvested publicly visible profile information, likely through automated access to LinkedIn's platform and APIs, in violation of the platform's terms of service. LinkedIn stated that the dataset drew from multiple sources and did not expose private account data, though the scale and sensitivity of what was compiled told a different story. The exposed data included names, email addresses, phone numbers, job titles, geographic locations, education history, genders, and links to social media profiles. Phone numbers and home addresses are not typically public on LinkedIn, raising concerns that some fields were extracted through API enumeration rather than simple profile scraping. Packaged together, this information creates a detailed professional identity profile for hundreds of millions of people, ready-made for targeted phishing, impersonation, fraud pretexting, and business relationship mapping at scale. LinkedIn filed a federal lawsuit in February 2022 against Mantheos Pte. Ltd., a Singapore-based company accused of scraping and reselling member data. The case settled in May 2022. Mantheos agreed to a permanent restraint from the practice but admitted no liability and paid no monetary compensation. No broad regulatory action was publicly reported. Affected individuals face elevated risk of spearphishing, executive-targeted scams, and business email compromise attacks, since the dataset gives bad actors detailed context to craft convincing, personalized outreach.
About LinkedIn
LinkedIn is a professional networking platform centered on work identity, career history, recruiting, business relationships, and professional publishing. Since Microsoft acquired it in 2016, it has operated as a large-scale employment and professional graph that serves job seekers, recruiters, advertisers, sales teams, and enterprise customers.
Why They Hold Your Data
Professional networking platforms collect identity, employment history, education, contact details, social connections, messaging, recruiting activity, and behavioral engagement data across career and hiring workflows.
Recent Developments
LinkedIn continues to position itself as a major AI-enabled talent and professional platform. Public materials and recent Microsoft disclosures point to ongoing product investment around recruiting, learning, and AI-related career tools, while Microsoft reported LinkedIn revenue growth and record engagement in FY25 Q2.
Data Points Exposed
Exposure Categories
Canonical Fields
education_information, email_address, full_name, gender, geographic_locations, job_information:job_title, phone_number, physical_address:home, social_media_profile
Dark Web Verification
- Dataset containing ~400.1M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: linkedin.com-2012;LinkedIn Scraped Data (2021) Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of LinkedIn
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
