Many of the LinkedIn emails alerts instructing users on how to reset passwords accessed by hackers were dumped into spam boxes, according to email security vendor Cloudmark.
In a blog post on Tuesday. Andrew Conway, a Cloudmark researcher, said a substantial increase in spam reports last weekend were traced to LinkedIn password reset email alerts
In many cases, the emails that users' marked as spam were legitimate alerts from LinkedIn, Conway said.
"Over 4% of the people receiving this email thought it was spam and sent it straight to the bit bucket," Conway said. "If Linkedin sends out 6.5 million emails, then a quarter of a million people are congratulating themselves on avoiding spam -- and still have a compromised Linkedin password."
Conway said that LinkedIn did all the right things to ensure that users would not treat its emails with suspicion. All were addressed to the recipient by name, did not contain any links and were DomainKeys Identified Mail (DKIM) signed to validate their authenticity.
"Even so, it was taken for spam," Conway said. "Part of the problem is that people are used to getting email that they don't want from LinkedIn, and rather than unsubscribe, some of them just mark it as spam and hope that it will go away."
In an email to Computerworld, Conway said that Cloudmark, a provider of messaging security services to Internet Service Providers, monitors messages for clients by assigning a number of digital signatures based on the content of the messages. Thus it can determine which signatures are present on emails that are manually flagged as spam by users.
"The Linkedin compromised email message[s] generated several unique signatures, so we are able to measure the rate at which these are marked [by users] as spam," he said.
Cloudmark was able to confirm that LinkedIn, and not spammers had sent the alerts because the emails were DKIM signed by Linkedin.com, he said.
The alerts were sent after hackers last week accessed about 6.5 million hashed passwords from a LinkedIn database and posted the stolen data on Russian hacker site.
By last weekend, most of the passwords were believed to have been decrypted by hackers and made available in plain text on many sites.
LinkedIn has confirmed the password compromise but released few details about the incident.
In three separate LinkedIn communications about the incident, the company didn't say how the passwords were accessed or whether other data, such as email IDs, were also compromised. LinkedIn said only that no email IDs have yet been publicly posted.
The latest LinkedIn update, posted yesterday, repeats much of the information that was included in previous notes.
The latest post did say that all passwords posted by the hackers, and that "we believed created risk for our members, based on our investigation," have been disabled.
Since the attack, LinkedIn has come in for some criticism for not better protecting passwords.
The company has said that it has completed a "long-planned transition" from merely hashing passwords to a system that both hashes and salts passwords. Salting is a process in which a random string of characters is appended to a password before it is hashed.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.