Hackers publish over 450,000 emails and passwords allegedly stolen from Yahoo
Hackers claim that an SQL injection vulnerability allowed them to steal plain-text log-in credentials from an unnamed Yahoo service
IDG News Service - A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service.
The group of hackers calls itself "the D33Ds Company" and claims to have hacked into the database by exploiting an SQL injection vulnerability found on a Yahoo subdomain.
"The subdomain and vulnerable parameters have not been posted to avoid further damage," the hackers said in their release notes.
The leaked information includes MySQL server variables, names of database tables and columns, as well as a list of 453,492 email addresses and passwords in plain text.
The exposed log-in credentials don't only include yahoo.com email addresses, but also email addresses from other public and non-public email providers.
An analysis of the data by Anders Nilsson, chief technology officer at Eurosecure, antivirus vendor ESET's distributor in Scandinavia, revealed that the most common domain names for the leaked email addresses were yahoo.com, gmail.com, hotmail.com and aol.com.
The most common password was "1234546" -- used by 1,666 users -- followed by the word "password" -- seen 780 times. In addition, "password" was used as a base word for 1373 passwords.
Even though the hackers did not name the affected Yahoo subdomain, Dave Kennedy, the chief executive officer of security firm TrustedSec, speculated, based on a host name found in the leaked data, that the service is Yahoo Voices, a library of user-generated content formerly known as Associated Content from Yahoo.
"We confirm that an older file from Yahoo Contributor Network (previously Associated Content) containing approximately 450,000 Yahoo and other company users names and passwords was compromised yesterday, July 11," Caroline MacLeod-Smith, Yahoo's head of consumer PR in the UK said via email. "Of these, less than 5% of the Yahoo accounts had valid passwords. We are taking immediate action by fixing the vulnerability that led to the disclosure of this data, changing the passwords of the affected Yahoo users and notifying the companies whose users accounts may have been compromised. We apologize to all affected users. We encourage users to change their passwords on a regular basis and also familiarize themselves with our online safety tips at security.yahoo.com."
"We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat," the hackers said. "There have been many security holes exploited in webservers belonging to Yahoo! Inc. that have caused far greater damage than our disclosure. Please do not take them lightly."
If someone's log-in credentials are leaked, there isn't much they can do except to change their passwords as soon as possible, pressure the responsible service provider into improving its security and consider moving to a safer service, David Harley, a senior research fellow at antivirus vendor ESET, said in a blog post on Thursday.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Best Practices in BYOD: BlackBerry Enterprise Service 10 Manageability, security and support - these are just a few of the reasons BlackBerry® Enterprise Service 10 is such a powerful Enterprise Mobility...
- How to Migrate from BlackBerry Enterprise Server v4.0 or v5.0 to BlackBerry Enterprise Service 10 With BlackBerry® Enterprise Service 10, you can manage your entire mobile fleet through a single, unified interface. Find out how to make the...
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Network Hardware White Papers | Webcasts