sb-as logo
Story image

Yahoo's 1bn user data breach: Everything you should know

Yahoo has uncovered another data breach, where more than 1bn user accounts were compromised in August 2013 - making it the largest data breach in history.

The company says it is ‘likely distinct’ from the data breach in September, and believes an unauthorised third party stole data associated with more than one billion user accounts in August.

Yahoo’s CISO, Bob Lord, confirmed the breach in a recent blog post saying that ’with the assistance of outside forensic experts…it appears to be Yahoo user data’.

“We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016,” writes Lord.

He says that for potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.

However, Lord explains that the stolen information did not include passwords in clear text, payment card data, or bank account information.

“Payment card data and bank account information are not stored in the system the company believes was affected,” he writes.

For all potentially affected Yahoo users, most should have been notified, and the company has taken steps to secure their accounts, including requiring users to change their passwords.

Lord also mentions that they have invalidated unencrypted security questions and answers so that they cannot be used to access an account.

Commenting on the breach, Ryan Kalember, SVP of Cyber Security Strategy at Proofpoint, says it’s critical that consumers and business alike realise that email credentials can be the gateway to more sensitive information than nearly anything else.

“News of the additional Yahoo breach is yet another indication that email accounts are a prime target among criminals,” he says.

“Email is the top way cyber criminals are breaking into the world’s most sophisticated organisations and they target personal inboxes and account information with the same aggressiveness.”

Tyler Moffit, senior threat research analyst at Webroot, adds that this data breach is huge on so many levels.

“Yahoo says hackers stole names, email addresses, phone numbers, dates of birth and encrypted or unencrypted security questions and answers from more than 1 billion accounts,” he says.

“These accounts have been compromised for years and the sheer number of accounts means this has been a large source of identity theft already.

No one should have faith in Yahoo at this point and might very well affect the $4.8 billion Verizon deal.”

Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."More
Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More