Yahoo Hack Affects 1 Billion Accounts

Security researchers are disturbed that it took Yahoo three years to discover that details on more than 1 billion user accounts had been stolen in 2013.

The breach suggests that someone, possibly a state-sponsored actor, had access to one of the largest email user bases in the world, without anyone knowing. The stolen database may have even included information on emails of US government and military employees.

This incident is distinct from the breach of 500 million accounts the company disclosed on September 22, 2016. Yahoo said in its announcement that how the breach was accomplished is not yet known, and that the company is working with law enforcement to investigate. 

This incident is regarded as being the largest breach on record, in terms of the number of individuals affected. 

People might suppose the breach is unlikely to affect them because the attack happened three years ago and there was no widely reported abuse of the data in the meantime. However, hackers might have targeted users' emails.

Yahoo has also said it is investigating a later, separate issue that might have made some accounts accessible without passwords. "Your email account is the central hub of your entire online existence, if they own that they can ask for password resets on other accounts you have online as well," explains Mr Cluley. Plus, anyone using their account for work purposes, such as sending professional documents back and forth in attachments, could in theory become a target of industrial espionage.

Even if accounts could only be accessed with passwords, the way they were encrypted is less secure than more modern techniques, according to Mr Cluley.

He adds that it is possible the data, including names, telephone numbers and dates of birth, will - or already has - become available to buyers on the dark net, although so far there has been no evidence of this.

Security expert and writer Brian Krebs said in a blog, "For years I have been urging friends and family to migrate off of Yahoo email, mainly because the company appeared to fall far behind its peers in blocking spam and other email-based attacks."

Yahoo has reassured its users: "We continuously enhance our safeguards and systems that detect and prevent unauthorised access to user account."

Some may not think of themselves as Yahoo users but the firm provides some BT and Sky customers' email accounts. "We are urgently investigating this with them," BT said in an online statement, in which it also advised those who had a BT Yahoo email account in August 2013 to reset their password.

Sky said it was advising Sky.com email account users to change their passwords and security question answers. It's also worth remembering that Yahoo acquired Flickr in 2005. Yahoo has said, though, that accounts for Tumblr - which it also owns - would not have been affected.

What should you do?

"Don't just change your Yahoo password," says Mr Cluley. That is the place to start, but once this password is changed, he also recommends changing your password on all other accounts you use and making sure that you use a different one for each.

Security question answers such as "what is your mother's maiden name?" should also be altered. It sounds like a lot of bother, but security experts are increasingly recommending that people use a simple password manager program such as Password Chef, LastPass or 1password.

Two-factor authentication allows users to verify logging in via, for example, entering a separate code sent to their mobile phone.

But the idea that online security stops with password management is outdated, says security expert Prof Alan Woodward at the University of Surrey.

"We're past that now," he says, adding that security professionals tend to enter fake information about themselves to online forms unless they can avoid it. "I'm like the Queen, I have two birthdays - my online birthday and my real birthday," explains Prof Woodward. "Do I give my real address? No - only for financial purposes like billing."

Yahoo accounts do allow users to see recent activity - for example, which computers were used to log in and where in the world they were located. Users can check this for any suspicious behaviour.

If users do want to move away from Yahoo after recent breaches, news site The Parallax recently wrote advice on how to do this.

The deal for mobile giant Verzon to acquire Yahoo for $4.8 billion continues to progress.

BBC:         CyberWire:          ComputerWorld:    More Questions About The Yahoo Breach:


 

« Obama Orders ‘Deep Dive’ Into Election Hacking
Destructive Cyber Attack On Saudi Kingdom »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.