Yahoo is investigating the theft of more than 400,000 plaintext passwords that were posted on the internet Wednesday night.
While most of the passwords seem to have been taken from the Yahoo voice services, various industry sources are recommending that everyone with a Yahoo account immediately change their passwords.
“In addition to changing their Yahoo passwords, people should change the passwords on any accounts for other sites or applications where they reused the same password, and this time they should not be using the same thing!” said Marcus Carey, security researcher at Rapid7.
“In this particular case Gmail, AOL, Hotmail, Comcast, MSN, SBC Global and Verizon users had their data breached as well, because they could sign up with any email address. The users of these other services could also be compromised because of password reuse.”
A group called the D33DS Company has been attributed as the source of the breach. The hackers are believed to have used a Union-based SQL injection to collect the data.
The password dump was designed to make a public point about Yahoo’s security and the state of information security in general.
“Basic SQL injection techniques were used to exploit vulnerabilities identified by the hackers,” said Sean Roth, database security product marketing manager, at McAfee.
“It’s increasingly important to have visibility into the number, location and types of databases in the landscape in order to accurately assess your level of vulnerability and successfully address those threats, whether those threats come from the inside or from the outside.”
Yahoo has acknowledged the breach and is urging users to change their passwords.
The news comes on the heels of a series of similar password breaches at LinkedIn and eHarmony, among others.
This article originally appeared at crn.com
Copyright © 2015 The Channel Company, LLC. All rights reserved.
Issue: 347 | March 2016