Yahoo Hack Affects 1 Billion Accounts

Security researchers are disturbed that it took Yahoo three years to discover that details on more than 1 billion user accounts had been stolen in 2013.

The breach suggests that someone, possibly a state-sponsored actor, had access to one of the largest email user bases in the world, without anyone knowing. The stolen database may have even included information on emails of US government and military employees.

This incident is distinct from the breach of 500 million accounts the company disclosed on September 22, 2016. Yahoo said in its announcement that how the breach was accomplished is not yet known, and that the company is working with law enforcement to investigate. 

This incident is regarded as being the largest breach on record, in terms of the number of individuals affected. 

People might suppose the breach is unlikely to affect them because the attack happened three years ago and there was no widely reported abuse of the data in the meantime. However, hackers might have targeted users' emails.

Yahoo has also said it is investigating a later, separate issue that might have made some accounts accessible without passwords. "Your email account is the central hub of your entire online existence, if they own that they can ask for password resets on other accounts you have online as well," explains Mr Cluley. Plus, anyone using their account for work purposes, such as sending professional documents back and forth in attachments, could in theory become a target of industrial espionage.

Even if accounts could only be accessed with passwords, the way they were encrypted is less secure than more modern techniques, according to Mr Cluley.

He adds that it is possible the data, including names, telephone numbers and dates of birth, will - or already has - become available to buyers on the dark net, although so far there has been no evidence of this.

Security expert and writer Brian Krebs said in a blog, "For years I have been urging friends and family to migrate off of Yahoo email, mainly because the company appeared to fall far behind its peers in blocking spam and other email-based attacks."

Yahoo has reassured its users: "We continuously enhance our safeguards and systems that detect and prevent unauthorised access to user account."

Some may not think of themselves as Yahoo users but the firm provides some BT and Sky customers' email accounts. "We are urgently investigating this with them," BT said in an online statement, in which it also advised those who had a BT Yahoo email account in August 2013 to reset their password.

Sky said it was advising Sky.com email account users to change their passwords and security question answers. It's also worth remembering that Yahoo acquired Flickr in 2005. Yahoo has said, though, that accounts for Tumblr - which it also owns - would not have been affected.

What should you do?

"Don't just change your Yahoo password," says Mr Cluley. That is the place to start, but once this password is changed, he also recommends changing your password on all other accounts you use and making sure that you use a different one for each.

Security question answers such as "what is your mother's maiden name?" should also be altered. It sounds like a lot of bother, but security experts are increasingly recommending that people use a simple password manager program such as Password Chef, LastPass or 1password.

Two-factor authentication allows users to verify logging in via, for example, entering a separate code sent to their mobile phone.

But the idea that online security stops with password management is outdated, says security expert Prof Alan Woodward at the University of Surrey.

"We're past that now," he says, adding that security professionals tend to enter fake information about themselves to online forms unless they can avoid it. "I'm like the Queen, I have two birthdays - my online birthday and my real birthday," explains Prof Woodward. "Do I give my real address? No - only for financial purposes like billing."

Yahoo accounts do allow users to see recent activity - for example, which computers were used to log in and where in the world they were located. Users can check this for any suspicious behaviour.

If users do want to move away from Yahoo after recent breaches, news site The Parallax recently wrote advice on how to do this.

The deal for mobile giant Verzon to acquire Yahoo for $4.8 billion continues to progress.

BBC:         CyberWire:          ComputerWorld:    More Questions About The Yahoo Breach:


 

« Obama Orders ‘Deep Dive’ Into Election Hacking
Destructive Cyber Attack On Saudi Kingdom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.