Yahoo Confirms Hack: 450K Encrypted Passwords were StolenAdded 13th Jul 2012
Yahoo today confirmed that 450,000 unencrypted usernames and passwords were stolen Wednesday from one of its services, although it downplayed the threat.
"We confirm that an older file from Yahoo! Contributor Network, previously Associated Content, containing approximately 450,000 Yahoo! and other company usernames and passwords was compromised yesterday, July 11," Yahoo said in a statement forwarded by a company spokeswoman Thursday.
"Of these, less than 5% of the Yahoo! accounts had valid passwords," the company maintained. However, it did not say what percentage of the remaining accounts, which included over 100,000 Gmail addresses and more than 55,000 Hotmail addresses, included valid passwords.
Yahoo Contributor Network is a platform that lets writers, photographers, and others share content with Yahoo members and earn money based on the traffic it generates. Users who contribute to the network are required to sign in using a Yahoo, Google or Facebook ID.
Yesterday, a hacker group calling itself "the D33Ds Company" claimed to have hacked into a Yahoo database by exploiting an SQL injection vulnerability found on a Yahoo subdomain. The group published a list of 453,492 plain-text email addresses and passwords.
Based on a host name left in the published materials, speculation yesterday focused on Yahoo Voices as the most likely subdomain that was hacked. Yahoo Voices is the portal where uses access the content posted by the Yahoo Contributor Network.
Yahoo said it was "fixing the vulnerability that led to the disclosure of this data," but did not confirm that the bug had actually been quashed. The company was also changing the passwords of affected Yahoo members.
"We apologize to all affected users," said Yahoo.
Almost a third -- 30.3% -- of the leaked email addresses were ones from yahoo.com, while 23.6% were Gmail addresses and 12.2% were Hotmail addresses, said security company Rapid7, which did a quick analysis of the data published on the Web Wednesday.
Aol.com, comcast.com msn.com, sbcglobal.com, live.com, verizon.net and bellsouth.net addresses rounded out the top 10.
Also included in the cache, said Marcus Carey, security researcher at Rapid7, were 123 government email accounts -- ones ending with ".gov" -- and 235 military-related addresses (ending with ".mil").
"Some of the government addresses were from various [U.S.] intelligence agencies, the FBI, TSA [Transportation Security Administration] and DHS [Department of Homeland Security]," said Carey. "Those, and of course, the .mil accounts, could be used for targeted attacks later."
Yahoo accounts made up less than a third of the 450,000 stolen from an online content-sharing service. (Data: Rapid7.)
Yahoo did not immediately respond to follow-up questions, including whether the leaked addresses and passwords were only from the pool of people who had registered with the Content Network to post their work on the site, or whether others, including those who may have accessed the content via the Voices portal, also needed to be concerned about the breach.
The Yahoo leak, which followed a much larger one last month that involved approximately 6.5 million encrypted passwords belonging to LinkedIn members, was another black eye for the online industry.
Several security researchers, including Carey, drew comparisons between the two. "Organizations and users still aren't taking security seriously enough," he said, referring to the constant barrage of credential breaches.
Carey, like Yahoo and scores of other security experts, urged Yahoo users to change their email accounts' passwords immediately, then follow that with changes to other site logins that rely on the same email address/username and password combination.
But Carey went further, noting that Yahoo may provide more information on the breach later, which could necessitate a second password reset if the leak has not been totally contained.
"You should still go ahead and change it straight away, but you may have to change it a second time if it turns out the attacks are still entrenched in Yahoo's systems," Carey said.
Carey recommended that people install and use a robust password manager that can create complex passwords automatically, then store them for instant retrieval on multiple devices.
"I use KeePass," said Carey, referring to a free open-source password manager for Windows. He also recommended LastPass for Windows, and said researchers at Rapid7 who worked on Macs relied on KeePass X and 1Password.
A password manager makes it easier to create and manage separate passwords for each website, online service or email account, thus limiting the damage if any one username/password combination leaks.
"There's always the potential of a [leaked] passwords also being used on, perhaps, a PayPal account," Carey said.
But the move toward aggregate credentials that access a slew of services provided by a single company -- like Gmail accounts and passwords being used for all Google's services, including Google Docs -- can make a password manager practice moot or nearly so.
"If someone has one account on one service, it lets them log in everywhere," said Carey, using Google as an example. "A lot of business processes store sensitive information on Docs. And because almost everything is Web-based now, 'in the cloud,' this is a problem that's only going to get worse."
Not surprisingly, Yahoo drew the ire of some experts.
"If what is stated is true, it's utter negligence to store passwords in the clear," said Mark Bower, a data protection expert at Voltage Security, in an email Thursday. "This breach just goes to show that even big companies aren't taking enough steps to protect critical data."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is email@example.com.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
Cloud computing is uniquely susceptible to the perils of myths due to the nature, confusion, and hype surrounding it, says Gartner.
Happiest Minds’ CEO will quit at the end of this month and the company will announce the new CEO shortly.
The iPad Air 2 revealed at a media event is even slimmer than its predecessor and looks more like its cousin, the iPhone, with a new gold hue and Touch ID.
The first priority is that the customers and partners experience no negative business impact as a result of this split announcement, says Sanjay Rohatgi of Symantec India.
Under the likes of S Gopalakrishnan, Infosys has witnessed growth from a market value of Rs 28.5 crore on the day of listing in India in 1993 to Rs 2,00,000 crore.
Technology leaders create new company with a vision to be the communications platform for the mobile workforce.
A split would be an about-face on CEO Meg Whitman's original strategy to keep the company together.
The tools can be used to modify the firmware on USB flash drives in order to infect computers with malware.
At the Amazon Executive Summit in India held on 30th September, Vogels said that the company has relentlessly focused on cost reduction, and that’s just one of the areas of Amazon’s persistent customer focus.
The services offered via the local datacenters has the potential to create new avenues for Microsoft India’s 10,000+ partner ecosystem, comprised of hosters, independent software vendors (ISVs), system integrators (SIs), and others.
The SDN 'dam has been busted' says HP.
Microsoft estimates that server migration will take at least 200 days and application migration may take more than 300 days.
A new feature in Mirage 5.1 lets adminstrators control bandwidth use at branch offices.
Privately held Metacloud provides OpenStack-as-a-service for global enterprises.
AppliedMicro is introducing its Helix ARM 64-bit embedded processor family at ARM TechCon.
With this change, Google risks upsetting Apps admins.
Apple is the first smartphone maker to abide by a new California anti-theft law.
Apple turned on two-factor authentication for iCloud, which will protect against the kind of social engineering exploits that helped hackers steal celebrity photos last month.
Apps that tap Dropbox's Datastore API can now let their users share the stored data with other people.
Cisco has adopted a "threat-focused" approach with its latest ASA firewall.