Attacks/Breaches
5/20/2013
12:16 PM
Connect Directly
RSS
E-Mail
50%
50%

Yahoo Japan Data Breach: 22M Accounts Exposed

Yahoo breach could have compromised 10% of all Yahoo user credentials. Meanwhile, Syrian Electronic Army targets The Financial Times.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
Yahoo disclosed Friday that a breach at Yahoo Japan may have exposed 22 million login names to attackers.

"We don't know if the file [containing 22 million user IDs] was leaked or not, but we can't deny the possibility, given the volume of traffic between our server and external terminals," read a statement issued Friday by Yahoo Japan. Yahoo is the country's most-visited website, and is jointly owned by Yahoo and Japanese network operator Softbank.

Yahoo Japan posted a link to a related breach notification on its homepage, and said it was contacting affected users and had strengthened network security in the wake of the attack. Yahoo Japan also recommended all users -- as of last year, the company had about 24 million users -- change their passwords, and added a tool on its homepage that allowed users to check if their ID was at risk from the suspected breach.

[ Defense Department and Google are partnering to tighten cloud user authentication. Read more at Google, DISA Launch User ID Pilot. ]

Yahoo Japan's users, however, can't change their login IDs -- which sometimes appear publicly; for example, when users post comments on shopping sites -- without losing access to their current account's email and stored data, reported PC Advisor. But after Yahoo Japan discovered malware on its servers last month that had extracted -- but not exfiltrated -- information relating to 1.27 million of its users, the company added a "Secret ID" capability, which allows users to use a separate ID only for logging on.

Yahoo officials said they discovered the unauthorized access Thursday. The potential data breach affects 10% of Yahoo's user base.

Yahoo was last in the data breach headlines in July 2012, when the company confirmed that an "older file" containing 450,000 usernames and passwords associated with its Yahoo Voices service had been leaked online. At the time, it said that only 5% of the leaked passwords were still valid. "D33Ds Company" took credit for the hack, saying it had been accomplished via SQL injection attack. The group said it had leaked the information "as a wake-up call, and not as a threat" to Yahoo to fix the vulnerability, the specifics of which the hackers didn't publicly detail.

In other hacking news, the Financial Times (FT) Friday became the latest victim of Syrian hackers, after its website and multiple Twitter accounts were compromised via spear-phishing attacks. "Syrian Electronic Army Was Here," read 12 posts to various FTTwitter feeds. Multiple fake messages were also posted to the newspaper's Twitter account.

The Syrian Electronic Army claimed to have compromised 17 of the newspaper's Twitter accounts as well as its website, and posted what it said was the username and password ("Gar1eth") for a marketing executive at the paper.

"We have now locked those accounts and are grateful for Twitter's help on this," said Robert Shrimsley, the managing editor of FT.com, reported the FT.

The newspaper is the latest media organization to have seen its Twitter feeds hacked by the Syrian Electronic Army, which supports Syrian President Bashar al-Assad. The group has preciously compromised an Associated Press feed, which it used to issue a fake alert that explosions had occurred in the White House. Other targets have included the BBC, the Guardian, National Public Radio and satire site The Onion.

Earlier this month, Twitter warned news and media outlets to expect further attacks.

To halt Twitter account takeovers, security experts have recommended using a dedicated PC for tweeting, or employing an intermediary social media management such as Hootsuite to block the spear-phishing attacks the group often uses to obtain credentials. They've also called on Twitter to implement two-factor authentication. But a "secret ID" service of the Yahoo Japan variety would also help Twitter users, since all Twitter usernames are already public, meaning would-be attackers only need to obtain a password to hack into an account.

As with previous Syrian Electronic Army takeovers, some of its FT tweets advanced the group's stated aim "[defending] the Syrian nation against the vicious lying media campaign," referring to perceived inaccuracies in reporting on the Syrian civil war. One bogus FT tweet, for example, read: "Jabhet A-Nosra terrorists executed innocent citizens," referring to the militant jihadist group that currently controls large parts of the rebel-held areas of northern Syria. Some leaders of that group recently pledged allegiance to al-Queda.

Interestingly, the FT last month interviewed a self-described member of the Syrian Electronic Army who calls himself "Th3Pr0." "All the countries who support the terrorists groups in Syria are targets for us -- their media/government website/social media accounts," Th3Pr0 said. "Our demands [are] to stop suspending our accounts and domain names so we can enjoy the 'Freedom speech of America.'"

Antivirus systems alone can't fight a growing category of malware whose strength lies in the fact that we have never seen it before. The How To Detect Zero-Day Malware And Limit Its Impact report examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'MuhammadH599
100%
0%
'MuhammadH599,
User Rank: Apprentice
3/1/2014 | 11:56:38 PM
I hate this
Waw that was terribel thing :|
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.