While LinkedIn has suffered a security breach in the past, this is an email scraping situation, nothing more, nothing less. In the method as mentioned in the first paragraph, the “hack in” button would enable users to locate the email address that are associated with the account, never mind that one is not even connected.
LinkedIn intends to take legal action concerning the plug-in, and has also advised users to uninstall it so that nothing untoward will happen, while minimizing the chances of any kind of unwanted security breach. Sell Hack defended themselves, touting that the plug-in was specially developed for marketing professionals, touting that all data pulled are already publicly available.
As for LinkedIn’s response, they mentioned, “We are doing everything we can to shut Sell Hack down. Yesterday LinkedIn’s legal team delivered Sell Hack a cease and desist letter as a result of several violations.
LinkedIn members who downloaded Sell Hack should uninstall it immediately and contact Sell Hack requesting that their data be deleted.
We advise LinkedIn members to protect themselves and to use caution before downloading any third-party extension or app. Often times, as with the Sell Hack case, extensions can upload your private LinkedIn information without your explicit consent.”