Yahoo is investigating the theft of more than 400,000 plaintext passwords that were posted on the internet Wednesday night.
While most of the passwords seem to have been taken from the Yahoo voice services, various industry sources are recommending that everyone with a Yahoo account immediately change their passwords.
“In addition to changing their Yahoo passwords, people should change the passwords on any accounts for other sites or applications where they reused the same password, and this time they should not be using the same thing!” said Marcus Carey, security researcher at Rapid7.
“In this particular case Gmail, AOL, Hotmail, Comcast, MSN, SBC Global and Verizon users had their data breached as well, because they could sign up with any email address. The users of these other services could also be compromised because of password reuse.”
A group called the D33DS Company has been attributed as the source of the breach. The hackers are believed to have used a Union-based SQL injection to collect the data.
The password dump was designed to make a public point about Yahoo’s security and the state of information security in general.
“Basic SQL injection techniques were used to exploit vulnerabilities identified by the hackers,” said Sean Roth, database security product marketing manager, at McAfee.
“It’s increasingly important to have visibility into the number, location and types of databases in the landscape in order to accurately assess your level of vulnerability and successfully address those threats, whether those threats come from the inside or from the outside.”
Yahoo has acknowledged the breach and is urging users to change their passwords.
The news comes on the heels of a series of similar password breaches at LinkedIn and eHarmony, among others.
This article originally appeared at crn.com
Copyright © 2014 The Channel Company, LLC. All rights reserved.
Issue: 339 | June 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.