Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Cloud»Cyber-attack on Yahoo
    Cloud

    Cyber-attack on Yahoo

    RahulBy Rahul16 October 2022Updated:25 October 2022No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    One billion' affected by Yahoo hack - BBC News

    Yahoo is an Internet service company. It has been targeted by the cyber-attack and it is caught up in one of the major data breaches till date on record. There have been two important data breaches of user accounts. User data has been revealed to the hackers during the second half of 2016. First publicly announced breach has been reported in September 2016. It has stated that the attack had occurred sometime in late 2014, and this had affected over 500 million Yahoo user accounts.  Another data breach had occurred around August 2013 but was officially reported in December 2016. This attack is believed to have affected over 1 billion user accounts by exposing their confidential information. Later, the internet service company confirmed in October 2017 that all 3 billion of its user accounts were compromised because of this cyber-attack. Both of the above-mentioned breaches are considered to be the biggest data breached which has ever happened in the history of the Internet. Specific data which has been compromised because of this data breach include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, date of birth, and hashed passwords.

    Further, Yahoo reported that the late 2014 breach likely used manufactured web cookies to falsify login credentials, allowing the hackers to gain access to any account without providing a password.

    Motivation of the attack

    Following the 2014 data breach, Yahoo claimed that intrusions and thefts by state-sponsored actors have become common across the technology industry. Yahoo has not particularly mentioned any country who might be behind this cyber-attack, but few of them suspect China or Russia to be behind this data breach.

    A security advisor claimed that China would be his top suspect behind this attack because China likes to collect and store all kinds of information and they have already had access to various kinds of information.

    Few people have expressed doubt about Yahoo claims that the attack being state sponsored, as it would be less embarrassing for Yahoo to accept that a cybercriminals group has been involved as it has been in the middle of being acquired by Verizon.

    Yahoo has been criticized for finding about these breaches after the damage has been done and for their late disclosure about the breaches and their security measures has faced several lawsuits as well as investigation by members of the Congress of United States. This breach had a major impact on Verizon Communications. Verizon had a deal with Yahoo to acquire it in July 2016 for about $4.8 billion. These data breaches resulted in a decrease of $350 million on the deal and it has been closed in June 2017.

    Class action Lawsuits

    There have been almost 23 lawsuits files against Yahoo related to its data breach in 2014. In one lawsuit it states that the personal financial matters have been compromised whereas the other lawsuit contends that Yahoo acted with negligence in dealing with the security breach as well as the way they reported it. Another lawsuit has been filed against Yahoo following their December 14 announcement in 2013, which states that Yahoo failed, and continues to fail, to provide necessary protection to its users personal and confidential information.

    Not just the United States government, but also the foreign governments have shown serious concerns following the data breach from Yahoo. They have asked Yahoo to communicate and provide all the details of the data breach to the EU authorities and to notify the users of Yahoo about the adverse effects which they might need to be facing and also warned Yahoo to be prepared for the national data protection authorities enquires in the upcoming days. Germany’s Information security also criticised Yahoo and stated that “Security is not a foreign concept” and advised the government and the users to seek alternate email and Internet solutions which have much better security measures and who are capable to provide security to the confidential information of the users.

    No one knows exactly what happened to the data after it has been stolen in 2013. But last August, a hacking collective which is based in Eastern Europe began offering Yahoo’s information for sale, according to the intelligence gathered by Info Armor, an Arizona cybersecurity company that monitors the darker corners of the web.

    Since then, there is assumed to be at least three buyers — two of them who are known as spammers and an entity which has appeared to be more interested in using the stolen Yahoo data for espionage — paid about $300,000 each for a complete copy of Yahoo’s stolen database, Info Armor said after Yahoo first disclosed the breach.

    Cybersecurity professionals warned that because many of the three billion Yahoo accounts belong to people who use the same passwords for different sites and services, there is likely to be an escalation of email fraud and account takeovers.

    With this stolen data, people who have obtained this sensitive information have a higher chance of gaining access to the victims’ bank accounts, said Frances Zelazny, the vice president of marketing at BioCatch. “Most people reuse passwords or make multiple versions of the same passwords that are easy to hack,” she said.

    In March, the Department of Justice also charged four men, which includes two Russian intelligence officers, with the 2014 breach. Investigators said the Russian government used stolen Yahoo data to spy on a range of targets in the United States, including White House and military officials, bank executives and even a gambling regulator in Nevada.

    The stolen data was also simultaneously used to spy on Russian government officials and business executives, federal prosecutors said.

    From this particular blog, I would like to emphasise on the importance of cyber security measures which are required by any company which deals with the confidential and personal information of their customers. If any breach is supposed to happen by these companies, they would be facing harsh lawsuits and would lose the public interest and the results are going to be catastrophic.

    benchmark IT services cybersecurity internet security TECHNOLOGY
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleGoogle workspace walkthrough
    Next Article AI IN AGRICULTURE
    Rahul

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Basic Differences Between MacOS and Windows 10: Which One is Right for You? 

    19 February 2025

    Operating Systems

    3 June 2024
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.