Vulnerabilities / Threats
9/25/2013
08:57 AM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Yahoo Responds To Recycled Email Security Problem

Yahoo will launch a "Not My Email" button to return old account-holders' email and help former users reclaim their accounts.

10 Ways To Fight Email Overload
10 Ways To Fight Email Overload
(click image for larger view and for slideshow)
Yahoo announced late Tuesday night that the company plans to roll out a tool for recipients of recycled email accounts to return messages that were not intended for them. InformationWeek reported Tuesday on three Yahoo users who began receiving emails containing personal information intended for the former user -- including bank and wireless account information -- after signing up for a recycled Yahoo account.

The new button, called "Not My Email," will roll out this week and will be found under the "Actions" tab in users' inboxes. The button will help users of recycled accounts train their inboxes to recognize which email is intended for them and which is not, eventually rejecting email before the user has read it.

Yahoo said it also plans to help to users who have lost their Yahoo account due to inactivity. These steps include outreach to users by phone and email and extending the grace period for inactive accounts.

[ Some Yahoo users got more than they bargained for. Read more: Yahoo Recycled Emails: Users Find Security Surprises. ]

In a statement to InformationWeek, a Yahoo spokesperson said that users of inactive accounts will be notified one month in advance via their Yahoo Mail account, alternate email address and SMS if their account is subject to being recycled. If they don't activate their account within the next 30 days by logging into any Yahoo property, the email account will be scrubbed and everything deleted.

"We will then bounce emails to it and after a period of time open it up for anyone to register for," the spokesperson said. "At that time, the earlier account owner could try to register for it -- but their content wouldn't be in there. Alternatively, if someone else registers the account, the earlier account owner could go to watchlist.yahoo.com and pay $1.99 to get put on the watchlist for that name and 4 others."

According to Dylan Casey, Yahoo's senior director of platforms, the company monitored systems for claims about mistaken deliveries and were able to identify the problem with some of the accounts. The email bounce method, he said, was insufficient for senders to see that the email was no longer valid. Casey maintained that the email problem has affected only a small number of Yahoo users.

Casey also said that Yahoo is continuing to look into its Require-Recipient-Valid-Since protocol, a header that senders add to emails to check the age of the account before delivering a message. The company said it is reaching out to businesses such as Amazon, eBay, PayPal and Walmart to target emails to current users instead of the former account holders.

Yahoo's initiative to free up dormant accounts began in mid-June when the company first announced its plan. Yahoo said it would alert users who had been inactive for at least 12 months and instruct them to login to their accounts if they wanted to keep them. Accounts that remained dormant would be recycled and up for grabs.

In July, Yahoo opened up a wish list where users could name their top five choices for a username. In August, Yahoo contacted them if one of their IDs was available and sent them instructions to claim it within 48 hours. Almost immediately, privacy advocates and security analysts criticized Yahoo's initiative.

A Yahoo user cited in InformationWeek's story reported that the emails he received would allow him to log into the former accountholder's Pandora and Facebook accounts. He also knew the user's name, address, phone number, the last four digits of the user's social security number and where the user's child goes to school.

The other Yahoo users reported similar experiences: They received email receipts from Nordstrom, timecards that detailed mileage reimbursements, airline confirmations and an apartment application confirmation.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kawit Ajang
50%
50%
Kawit Ajang,
User Rank: Apprentice
9/26/2013 | 8:06:32 AM
re: Yahoo Responds To Recycled Email Security Problem
why
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
9/25/2013 | 6:10:57 PM
re: Yahoo Responds To Recycled Email Security Problem
"Not My Email"... LOL
They follow up one disaster with another. It's NEVER a good idea to recycle any account without first deleting any data associated with the previous account holder. Yahoo should have handled this correctly instead of making one gaffe beget another.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.