Reports from leading internet experts are indicating that the OpenSSL vulnerability now known as “Heartbleed” was exploited over the last two years by hackers targeting servers at LinkedIn. The alleged violators used the exploit to endorse random contacts for skills they might or might not have had any experience with. Reports from as early as 2012 indicated something astray with the professional networking service.
“Oh yes, we heard multiple reports of that kind of thing. For example, a ton of people called saying they were endorsed by someone they never worked with, for a skill they never possessed. I just blew it off. Who the hell cares, really? I don’t even know what LinkedIn is for, said LinkedIn tech support director Shane Aldridge. “In fact, I rarely even answer the phone unless I’m really bored. This is all free anyway, so…you know… you get what you pay for…Wait, what? Some people actually pay for this shit? Really? Huh…how about that…”
The vulnerability was also exploited to gain access to Pinterest passwords, for some unimaginable reason, which hackers apparently used to bore each other to fucking death. Hackers even gained access to Yahoo Mail passwords with malicious intent, but in the end decided that people stuck using Yahoo Mail had almost certainly already suffered enough.
5 thoughts on “Hackers Exploited ‘Heartbleed’ to Endorse Random Contacts on LinkedIn”
Nice! And I love the Yahoo mail comment!
Ah … that explains why I got endorsed for my skills as a nuclear engineer. Something like that could blow up in my face.
Good post. And what is it that Linkedin does? 🙂
I’m not really sure what Linkedin is for, either.
I’m just glad it wasn’t a nosebleed exploit!
Comments are closed.