Unsurprisingly, there are no clues about who 'stole' the password hash file or how they did it, but LinkedIn confirmed that the password hashes were theirs.
The company first disabled accounts with passwords known to have been decoded, followed by those that were on the list regardless of whether they had been decoded. This process was completed by the end of July 7, the day after the matter came to light.
LinkedIn officials say affected members were emailed instructions for resetting their passwords.
"At this time, there have been no reports of compromised LinkedIn accounts as a result of this password theft," the officials stated, adding "We are continuing to work with law enforcement as they investigate this crime."
Page 2: Apology