{"id":13082,"date":"2016-09-27T08:50:29","date_gmt":"2016-09-27T12:50:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=13082"},"modified":"2019-11-15T06:53:11","modified_gmt":"2019-11-15T11:53:11","slug":"yahoo-hack-complexity-growing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/yahoo-hack-complexity-growing\/13082\/","title":{"rendered":"More bad news from Yahoo"},"content":{"rendered":"<p>Has the shock and awe of Yahoo\u2019s 500 million user credential hack died down yet? Everyone breathing a bit easier? Passwords changed, dead accounts deleted?<\/p>\n<p>For those of you chuckling and noting, \u201cI never had a Yahoo Account,\u201d or \u201cWho uses Yahoo, anyway?\u201d you may want to look into some of your accounts because you <em>may<\/em> have a Yahoo account and not even know it.<\/p>\n<p>Wait, what?<\/p>\n<p>You\u2019ve probably heard of or use <a href=\"https:\/\/apps.google.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Google Apps for Work<\/a>, tools including e-mail that some companies use to run their businesses. What you may not know, given Google\u2019s ubiquitous presence, is that <a href=\"https:\/\/smallbusiness.yahoo.com\/email\" target=\"_blank\" rel=\"noopener nofollow\">Yahoo offers a similar service<\/a> (called Aabaco Small Business).<\/p>\n<p>How many companies might that affect? Well, according to <a href=\"https:\/\/www.grahamcluley.com\/yahoo-email-address-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">a recent blog post<\/a> from Graham Cluley, more than 500,000 domains use Yahoo as their e-mail provider. Any of those domains could be part of the massive theft of data, which Yahoo stated was state sponsored.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-7703\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06015658\/Screen-Shot-2016-09-26-at-1.24.18-PM.png\" alt=\"screen-shot-2016-09-26-at-1-24-18-pm\" width=\"2416\" height=\"1138\"><\/p>\n<p>According to Kurt Baumgartner, principal security researcher on Kaspersky Lab\u2019s Global Research and Analysis Team (GReAT): \u201cThis situation reminds us of Google\u2019s Aurora APT incident in 2009, announced in 2010. When we compare these two breaches, it is incredible that it\u2019s 2016 and users are being notified years after a major breach, and only after another organization made the issue public. These types of breaches highlight why all companies need to be cybersecurity leaders, implementing industry best practices and available security technologies.\u201d<\/p>\n<p>So: What can you do?<\/p>\n<p>The data breach happened in 2014, and we are learning the extent of it only now. Criminals have had some time to pore over this data. Key priorities now are to change passwords and use <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Have I Been Pwned?<\/a> to check your current e-mail addresses as well ones that you may no longer use or that were from past employers. Then, even if the accounts haven\u2019t been breached, it\u2019s a good idea to delete accounts you no longer use. As we\u2019ve seen with cases such as <a href=\"https:\/\/www.kaspersky.com\/blog\/myspace-tumbler-data-breach\/12252\/\" target=\"_blank\" rel=\"noopener nofollow\">Myspace\u2019s data breach<\/a>, criminals care about data and login credentials \u2014 it doesn\u2019t matter if you are actively using the site; they know we humans are lazy and reuse passwords.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Yahoo?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Yahoo<\/a> expected to confirm massive <a href=\"https:\/\/twitter.com\/hashtag\/data?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#data<\/a> breach <a href=\"https:\/\/t.co\/hgfblUpiuS\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/hgfblUpiuS<\/a> <a href=\"https:\/\/t.co\/2jldXb78GF\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/2jldXb78GF<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/778968581283414016?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Baumgartner also offers some words of caution to those caught up in the breach: \u201cDo not fall for the social engineering schemes that will follow this incident. Everyone should be aware that any breach notice that Yahoo! emails out will go only to their email service users, and it will not provide links to click on or include any attachments, and it will <em>not<\/em> ask for personal information.\u201d<\/p>\n<p><em>\u00a0<\/em>This is unlikely to be the final chapter of the Yahoo saga. Please stay tuned here and to <a href=\"https:\/\/threatpost.com\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>; we will surely have coverage of this moving forward.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have more bad news from the Yahoo hack: Even without a yahoo.com account, you may be at risk.<\/p>\n","protected":false},"author":636,"featured_media":13083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[191,19,899,187,914,433,780,1820],"class_list":{"0":"post-13082","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-data","10":"tag-email","11":"tag-hack","12":"tag-passwords","13":"tag-private-data","14":"tag-security-breach","15":"tag-yahoo","16":"tag-yahoo-breach"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/yahoo-hack-complexity-growing\/13082\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/yahoo-hack-complexity-growing\/7701\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/yahoo-hack-complexity-growing\/7711\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/yahoo-hack-complexity-growing\/7752\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/yahoo-hack-complexity-growing\/9168\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/yahoo-hack-complexity-growing\/9031\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/yahoo-hack-complexity-growing\/13197\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/yahoo-hack-complexity-growing\/2446\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/yahoo-hack-complexity-growing\/6581\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/yahoo-hack-complexity-growing\/5436\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/yahoo-hack-complexity-growing\/8793\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/yahoo-hack-complexity-growing\/12680\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/yahoo-hack-complexity-growing\/13197\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/yahoo-hack-complexity-growing\/13082\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/yahoo-hack-complexity-growing\/13082\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/security-breach\/","name":"security breach"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13082"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13082\/revisions"}],"predecessor-version":[{"id":30142,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13082\/revisions\/30142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13083"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}