How it Happened
On Wednesday, February 15, Yahoo quietly sent out notifications to users warning that their accounts may have been compromised and that the incidents may have occurred as recently as last year or as early as 2015. The investigation turned up evidence that attackers used forged browser cookies to log into accounts without the use of passwords. The cookie exploit was traced back to a flaw in the security of Yahoo’s mail server. Essentially, it allowed hackers using malicious cookies to log into accounts by tricking the mail server to think the user had previously logged in from that source when in fact they never did. From there, the hackers had access to the email, accounts, and potentially other settings and information stored in Yahoo. Unfortunately, according to reports, the investigation into this breach has not been closed and more details or other incidents may surface. If you think this latest breach means nothing except to Yahoo users, think again. It has far reaching effects – from Yahoo stock holders to the entire information technology industry. On the same Wednesday, Verizon announced it was going to cut the offer price for Yahoo by at least $250 million! Presumably this is due to the previous data breaches and now the latest announcement of a pending deal closure as reported by Bloomberg.What’s Next?
So what is next for Yahoo? Potentially a forth breach disclosure, more details on how malicious cookies circumvented Yahoo security, users changing their passwords more frequently, or an exodus of users losing faith in Yahoo and closing their accounts. Whatever does happen next, all users and security professionals need to be aware of the risks of stagnant passwords, and that bad security practices from improper public disclosure to real exploits can have ramifications on data security and financial bottom lines. Please remember these guidelines about passwords:- Never re-use the same password between work and home
- Never re-use the same password for financial institutions and social media
- Never re-use the same password for an administrator account at work as your standard logon
- Never tell anyone your password. If you need to share it, change it when the other person is done with using it.
- Change your passwords frequently. Yes, ALL of them.
- For individuals, use a secure personal password manager like Apple iCloud Keychain, or third party application to remember your passwords and create new randomized ones.
- For organizations use an enterprise password management solutions at work for password tracking, release, randomization, and workflow.
Morey J. Haber, Chief Security Advisor
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.