Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Big Data
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Yahoo Breach Having a Ripple Effect
Yahoo Breach Having a Ripple Effect

By Jennifer LeClaire
July 13, 2012 12:36PM

Bookmark and Share
"Passwords are of value when associated with an e-mail account, which is purported to be the case in the Yahoo breach," said security expert Chris Petersen. "Because users often use the same password across different accounts, cyber criminals might be able to access other sites." Some 453,492 Yahoo accounts were hacked.
 


Yahoo on Thursday confirmed that more than 400,000 user names and passwords were stolen in a hack attack by a group calling itself D33D Company.

But the Yahoo breach is having a ripple effect through the industry. That's because the passwords to the 453,492 accounts not only belong to Yahoo users, they also work on Gmail, Hotmail, AOL, MSN, Comcast, SBC Global, Bellsouth, Live.com and Verizon accounts.

In a published statement, Yahoo said it was "fixing the vulnerability that led to the disclosure of this data, changing the passwords of the affected Yahoo users and notifying companies whose user accounts may have been compromised." But security experts are still suggesting users change their passwords to Yahoo and other sites.

A Black Market for Passwords

We turned to Chris Petersen, chief technology officer and founder of LogRhythm, to get his second-day reaction on the Yahoo breach. He told us Web applications continue to be seen as a soft target by cyber criminals looking to sell passwords on the black market.

"Passwords are of value when associated with an e-mail account, which is purported to be the case in the Yahoo breach," Petersen said. "Because users often use the same password across different accounts, cyber criminals might be able to access other sites, company networks, and banking accounts if they can successfully map the compromised e-mail address to the individual that owns it."

Petersen is charging organizations to start doing a better job of implementing Web application defenses if they want to avoid being the next Yahoo. Perimeter defenses including Web application firewalls are a good start but by themselves not sufficient.

"These technologies operate largely on the premise they can detect what is known," Petersen said. "To have a chance detecting what is not known, additional monitoring and response approaches must be employed. For example, by analyzing Web server logs and network activity patterns, attacks that evade perimeter defense can still be detected and defended against."

Detecting Hackers

Tom Cross, director of security research at Lancope, said there are a lot of passwords and password hashes circulating in the underground after a string of recent breaches and disclosures like this one and the recent LinkedIn hack that saw 6.5 million passwords exposed on a Russian site.

"We have every reason to believe that we are going to see similar compromises in the future," Cross told us. "These passwords are going to be used to compromise corporate networks."

From Cross' perspective, the question that we need to be asking is this: How do we detect attackers who log into our networks with legitimate credentials?

"Organizations that are only focused on looking for exploit activity at the network perimeter can't see attacks after they've already gotten in the front door," Cross said. "IT security teams also need visibility into authorized traffic on the internal network that enables them to detect and mitigate compromises after the walls have been breached."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Big Data
1.   Hortonworks, Concurrent To Partner
2.   Mobile Ad Platform From Facebook?
3.   Facebook Rolls Out Friend Tracker
4.   Mark Hurd's 5 Keys to Market Success
5.   Data Compilers Peg Consumers


advertisement
Data Compilers Peg Consumers
Sizing up with scores -- fairly or not.
Average Rating:
Fast Seagate 6 TB Drive for Data Center
Can use 12 Gb/s SAS interface.
Average Rating:
Police Keep Quiet About Cell Tracking
Tool called Stingray remains a mystery.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Verizon Data Breach Report Exposes Top Threats
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
White House Updating Online Privacy Policy
A new Obama administration privacy policy explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, saying much is in the public domain.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.