How it HappenedOn Wednesday, February 15, Yahoo quietly sent out notifications to users warning that their accounts may have been compromised and that the incidents may have occurred as recently as last year or as early as 2015. The investigation turned up evidence that attackers used forged browser cookies to log into accounts without the use of passwords. The cookie exploit was traced back to a flaw in the security of Yahoo’s mail server. Essentially, it allowed hackers using malicious cookies to log into accounts by tricking the mail server to think the user had previously logged in from that source when in fact they never did. From there, the hackers had access to the email, accounts, and potentially other settings and information stored in Yahoo. Unfortunately, according to reports, the investigation into this breach has not been closed and more details or other incidents may surface. If you think this latest breach means nothing except to Yahoo users, think again. It has far reaching effects – from Yahoo stock holders to the entire information technology industry. On the same Wednesday, Verizon announced it was going to cut the offer price for Yahoo by at least $250 million! Presumably this is due to the previous data breaches and now the latest announcement of a pending deal closure as reported by Bloomberg.
What’s Next?So what is next for Yahoo? Potentially a forth breach disclosure, more details on how malicious cookies circumvented Yahoo security, users changing their passwords more frequently, or an exodus of users losing faith in Yahoo and closing their accounts. Whatever does happen next, all users and security professionals need to be aware of the risks of stagnant passwords, and that bad security practices from improper public disclosure to real exploits can have ramifications on data security and financial bottom lines. Please remember these guidelines about passwords:
- Never re-use the same password between work and home
- Never re-use the same password for financial institutions and social media
- Never re-use the same password for an administrator account at work as your standard logon
- Never tell anyone your password. If you need to share it, change it when the other person is done with using it.
- Change your passwords frequently. Yes, ALL of them.
- For individuals, use a secure personal password manager like Apple iCloud Keychain, or third party application to remember your passwords and create new randomized ones.
- For organizations use an enterprise password management solutions at work for password tracking, release, randomization, and workflow.
Morey J. Haber, Chief Security Officer, BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.