A hacker known as "Peace" is selling what is reportedly account information from 117 million LinkedIn users. The stolen data includes emails, passwords, and so on.
The hacker says the credentials were obtained during a LinkedIn data breach in 2012 that saw 6.5 million encrypted passwords posted online, according to Motherboard. Peace is selling the data for about $2,200 (5 bitcoin) on the "dark web," the part of the internet accessible only with a special browser that masks user identities.
LinkedIn told Motherboard that it was investigating, but could not confirm whether the data was authentic. Spokesperson Hani Durzy did, however, say that the company didn't know how many accounts were compromised in the data breach.
Motherboard and Troy Hunt, a security researcher, reached out to victims of the data breach, and were able to confirm that at least three of the passwords were legitimate.
Why are these credentials coming out now? "People may not have taken it very seriously back then as it was not spread," one of the people behind LeakedSource, which also claims to have access to the data, told Motherboard. "To my knowledge the database was kept within a small group of Russians."
LinkedIn was not immediately available for comment.
RELATED: Notable data breaches
Notable Data Breaches
A hacker is reportedly selling the stolen emails and passwords of 117 million LinkedIn users
LONDON, ENGLAND - AUGUST 19: A detail of the Ashley Madison website on August 19, 2015 in London, England. Hackers who stole customer information from the cheating site AshleyMadison.com dumped 9.7 gigabytes of data to the dark web on Tuesday fulfilling a threat to release sensitive information including account details, log-ins and credit card details, if Avid Life Media, the owner of the website didn't take Ashley Madison.com offline permanently. (Photo by Carl Court/Getty Images)
The Homeland Security Department headquarters in northwest Washington, Friday, June 5, 2015. China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time. The Department of Homeland Security said in a statement that data from the Office of Personnel Management _ the human resources department for the federal government _ and the Interior Department had been compromised. (AP Photo/Susan Walsh)
FILE - In this Feb. 5, 2015 file photo, the Anthem logo hangs at the health insurer's corporate headquarters in Indianapolis. Insurers aren't required to encrypt consumers' data under a 1990s federal law that remains the foundation for health care privacy in the Internet age _ a striking omission in light of the cyberattack against Anthem, the nation's second-largest health insurer. (AP Photo/Michael Conroy, File)
Sony Pictures Entertainment headquarters in Culver City, Calif. on Tuesday, Dec. 2, 2014. The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week. (AP Photo/Nick Ut)
FILE - In this file photo made Oct. 6, 2009, employee John Abou Nasr pushes shopping carts in the parking lot of a Home Depot in Methuen, Mass. Home Depot's data breach could wind up being among the largest ever for a retailer, but that may not matter to its millions of customers. (AP Photo/Elise Amendola, File)
Shoppers arrive at a Target store in Los Angeles on Thursday, Dec. 19, 2013. Target says that about 40 million credit and debit card accounts may have been affected by a data breach that occurred just as the holiday shopping season shifted into high gear. (AP Photo/Damian Dovarganes)
Graphic shows details of recent notable data breaches by organization; 3c x 7 inches; 146 mm x 177 mm;