Ramblings of an old Doc
Change your password and security questions
Published on December 14, 2016 By DrJBHL In Personal Computing

 

"Yahoo previously disclosed in November, law enforcement provided the company with data files that a third party claimed was Yahoo user data. The company analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, Yahoo believes an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. The company has not been able to identify the intrusion associated with this theft. Yahoo believes this incident is likely distinct from the incident the company disclosed on September 22, 2016.

For potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers. The investigation indicates that the stolen information did not include passwords in clear text, payment card data, or bank account information. Payment card data and bank account information are not stored in the system the company believes was affected.

Yahoo is notifying potentially affected users and has taken steps to secure their accounts, including requiring users to change their passwords. Yahoo has also invalidated unencrypted security questions and answers so that they cannot be used to access an account....

...The company has connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016.

Yahoo encourages users to review all of their online accounts for suspicious activity and to change their passwords and security questions and answers for any other accounts on which they use the same or similar information used for their Yahoo account. The company further recommends that users avoid clicking links or downloading attachments from suspicious emails and that they be cautious of unsolicited communications that ask for personal information. Additionally, Yahoo recommends using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password on Yahoo altogether.

Additional information is available on the Yahoo Account Security Issues FAQs page: https://yahoo.com/security-update."

 

Source:

http://www.businesswire.com/news/home/20161214006239/en/Important-Security-Information-Yahoo-Users

 



 


Comments
on Dec 14, 2016

Never ends.

on Dec 15, 2016

at least not for yahoo

on Dec 15, 2016

Par for the course. 

on Dec 15, 2016

hashed passwords (using MD5)

(using MD5)

MD5 has been known to be vulnerable to collision attacks for twenty years, and to trivial practical attacks for more than ten. Yahoo's continued use of MD5 for password storage is little different in 2016 from having stored them as plain text.

If you have a Yahoo account, and use the same password anywhere else, change them now. And don't reuse passwords any more...

 

on Dec 15, 2016

Changing passwords to using notification by phone (Yahoo account key) is another solution...

But since you can't really change gender and SS number, etc. changing your password is the way to go in the meantime, for sure. And...learn to use unique passwords for each site, and a password keeper like 1PassWord, LastPass, etc.

on Dec 15, 2016

"more than one billion user accounts"

Mind boggles. Glad I never got a Yahoo account lol.

on Dec 15, 2016


MD5 has been known to be vulnerable to collision attacks for twenty years, and to trivial practical attacks for more than ten. Yahoo's continued use of MD5 for password storage is little different in 2016 from having stored them as plain text.

At best, I'd have to call that "a very poor and disappointing choice" on the part of Yahoo's management.  At worst, I'd call it something else.

on Dec 15, 2016

Here's the something else...

WAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA!!!!!

Ok......ok.