Hackers have a treasure trove of data with the Yahoo breach

The data breach affects at least half a billion Yahoo accounts

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk.

At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.

Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.

Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.

Stealing data on 500 million accounts is usually no easy task, he added. "The hackers probably attacked slowly, and quietly, without anyone watching," Kremez said. "They couldn't just come in and take the grand piano."

Prior to Thursday's confirmed breach, Yahoo had already been investigating another leak. In August, an anonymous hacker was found selling a database with login details on 200 million Yahoo accounts.

The company hasn't said if the two incidents are connected. Still, Alex Holden, CIO at security firm Hold Security, wonders how many hackers are in possession of the company's stolen database.

"The Yahoo data breach will have a much bigger impact than almost any other breach that I can speak of," Holden said. "Yahoo was once the number one email provider."

According to Yahoo, the breach disclosed on Thursday involved data taken from late 2014 -- meaning hackers had two years to secretly capitalize on what they stole. Security experts like Holden have noted that some people rely on Yahoo email for work purposes, putting corporate information potentially at risk.

Why it took so long for Yahoo to find out and inform the public wasn't clear from the company's statement on the breach.

"This is probably the worst thing that could have happened," said Brad Bussie, director of product management at Stealthbits Technologies. "They (Yahoo) were probably trying to find the best way to break this info to the press."

The hack also surprised Verizon, which recently agreed to acquire Yahoo.

It said on Thursday that it had only learned about the breach within the last two days. "We will evaluate as the investigation continues through the lens of overall Verizon interests," the company said.

Yahoo is already notifying the affected users, and working with law enforcement to investigate the incident. The company added that most of the passwords stolen were hashed with bcrypt, making them exceptionally difficult to crack.

However, the stolen data from Yahoo can be used in other ways to attack victims, Bussie said. The stolen email addresses alone put users at risk of spam attacks and the additional information could be used to trick users into divulging more information about themselves.

The stolen data from Yahoo also includes the security questions and answers used to protect their accounts. "Most people use the same questions and answers on multiple sites, even for the corporate ones," Bussie added.

Even though it may be time-consuming, he advises that affected users change their passwords and security questions, not just at Yahoo, but across all their internet accounts.

As shocking as the size of the breach is, security experts aren't surprised it happened. Yahoo is just the latest high-profile company to fall victim. Earlier this year, Dropbox, LinkedIn and Myspace also reported data breaches affecting millions of user accounts. Hackers and data hoarders have been trading the information online.

"When you start combining all these different data dumps, you get some valuable information on internet users," said Jeremiah Grossman, chief of security strategy, at SentinelOne. "It makes it easier for all kinds of hacks, state-sponsored or cyber crime."

Join the PC World newsletter!

Error: Please check your email address.

Tags Yahoohacking

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?