Millions of LinkedIn Details Exposed in Latest Scraping Incident

Representational image of a data breach

This post is also available in: עברית (Hebrew)

A newly discovered dataset containing millions of scraped LinkedIn profiles has renewed concerns about how easily professional information can be harvested, aggregated, and reused without users’ knowledge. Unlike a traditional breach, scraping collects data that users intentionally make public—but once copied in bulk, the information becomes far more valuable to malicious actors than when viewed one profile at a time.

Early examinations of the leaked dataset show that it contains several million individual profile records, including names, job titles, company affiliations, employment history, skills, locations, profile URLs, and—in some cases—contact details that users voluntarily attached to their profiles. The leak also includes structured metadata such as industry tags, seniority indicators, and network attributes that help attackers sort targets by role, region, or organization.

While no internal LinkedIn systems appear to have been compromised, the scale and organization of the scraped data make this incident significant. A profile that seems harmless in isolation becomes a risk when aggregated into a searchable, exportable database that can be bought, sold, or merged with older leaks.

Aggregated career data allows adversaries to:

  • Map organizational hierarchies to understand who sits where in an agency or company.
  • Identify individuals with access to sensitive systems, procurement authority, or technical expertise.
  • Craft highly convincing spear-phishing emails using job-specific details.
  • Combine scraped LinkedIn data with previous corporate leaks to build deep dossiers on employees.
  • Track career movements of personnel involved in defense programs or national-security roles.

In operational terms, these datasets become tools for reconnaissance.

According to CyberNews, this incident follows earlier massive exposures: Apollo.io’s unsecured database containing billions of records in 2018, People Data Labs’ breach affecting 622 million individuals in 2019, and an additional 170-million-record exposure linked to PDL last year. Together, they demonstrate how easily professional and corporate identity data circulates once scraped.

To curb scraping, LinkedIn recently filed a lawsuit against software company ProAPIs, accusing it of creating hundreds of thousands of fake accounts to harvest member data. The company argues that such scraping exposes users to scams, automated spam, and unauthorized sale of personal information.

As professional platforms continue to grow, mass-scale scraping events are no longer niche cybersecurity issues—they are direct risks to organizations and individuals working in sensitive fields.