Vulnerabilities / Threats
9/25/2013
08:57 AM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Yahoo Responds To Recycled Email Security Problem

Yahoo will launch a "Not My Email" button to return old account-holders' email and help former users reclaim their accounts.

10 Ways To Fight Email Overload
10 Ways To Fight Email Overload
(click image for larger view and for slideshow)
Yahoo announced late Tuesday night that the company plans to roll out a tool for recipients of recycled email accounts to return messages that were not intended for them. InformationWeek reported Tuesday on three Yahoo users who began receiving emails containing personal information intended for the former user -- including bank and wireless account information -- after signing up for a recycled Yahoo account.

The new button, called "Not My Email," will roll out this week and will be found under the "Actions" tab in users' inboxes. The button will help users of recycled accounts train their inboxes to recognize which email is intended for them and which is not, eventually rejecting email before the user has read it.

Yahoo said it also plans to help to users who have lost their Yahoo account due to inactivity. These steps include outreach to users by phone and email and extending the grace period for inactive accounts.

[ Some Yahoo users got more than they bargained for. Read more: Yahoo Recycled Emails: Users Find Security Surprises. ]

In a statement to InformationWeek, a Yahoo spokesperson said that users of inactive accounts will be notified one month in advance via their Yahoo Mail account, alternate email address and SMS if their account is subject to being recycled. If they don't activate their account within the next 30 days by logging into any Yahoo property, the email account will be scrubbed and everything deleted.

"We will then bounce emails to it and after a period of time open it up for anyone to register for," the spokesperson said. "At that time, the earlier account owner could try to register for it -- but their content wouldn't be in there. Alternatively, if someone else registers the account, the earlier account owner could go to watchlist.yahoo.com and pay $1.99 to get put on the watchlist for that name and 4 others."

According to Dylan Casey, Yahoo's senior director of platforms, the company monitored systems for claims about mistaken deliveries and were able to identify the problem with some of the accounts. The email bounce method, he said, was insufficient for senders to see that the email was no longer valid. Casey maintained that the email problem has affected only a small number of Yahoo users.

Casey also said that Yahoo is continuing to look into its Require-Recipient-Valid-Since protocol, a header that senders add to emails to check the age of the account before delivering a message. The company said it is reaching out to businesses such as Amazon, eBay, PayPal and Walmart to target emails to current users instead of the former account holders.

Yahoo's initiative to free up dormant accounts began in mid-June when the company first announced its plan. Yahoo said it would alert users who had been inactive for at least 12 months and instruct them to login to their accounts if they wanted to keep them. Accounts that remained dormant would be recycled and up for grabs.

In July, Yahoo opened up a wish list where users could name their top five choices for a username. In August, Yahoo contacted them if one of their IDs was available and sent them instructions to claim it within 48 hours. Almost immediately, privacy advocates and security analysts criticized Yahoo's initiative.

A Yahoo user cited in InformationWeek's story reported that the emails he received would allow him to log into the former accountholder's Pandora and Facebook accounts. He also knew the user's name, address, phone number, the last four digits of the user's social security number and where the user's child goes to school.

The other Yahoo users reported similar experiences: They received email receipts from Nordstrom, timecards that detailed mileage reimbursements, airline confirmations and an apartment application confirmation.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kawit Ajang
50%
50%
Kawit Ajang,
User Rank: Apprentice
9/26/2013 | 8:06:32 AM
re: Yahoo Responds To Recycled Email Security Problem
why
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
9/25/2013 | 6:10:57 PM
re: Yahoo Responds To Recycled Email Security Problem
"Not My Email"... LOL
They follow up one disaster with another. It's NEVER a good idea to recycle any account without first deleting any data associated with the previous account holder. Yahoo should have handled this correctly instead of making one gaffe beget another.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5314
Published: 2014-11-23
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

CVE-2014-5325
Published: 2014-11-23
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

CVE-2014-5326
Published: 2014-11-23
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?