{"id":13047,"date":"2016-09-22T10:23:53","date_gmt":"2016-09-22T14:23:53","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=13047"},"modified":"2019-11-15T13:48:25","modified_gmt":"2019-11-15T11:48:25","slug":"possible-yahoo-password-leak","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/possible-yahoo-password-leak\/13047\/","title":{"rendered":"Yahoo expected to confirm massive data breach"},"content":{"rendered":"<p>Yahoo is <a href=\"http:\/\/www.recode.net\/2016\/9\/22\/13012836\/yahoo-is-expected-to-confirm-massive-data-breach-impacting-hundreds-of-millions-of-users\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">expected to announce<\/a> a \u201cmassive\u201d data breach ahead of its impending sale to Verizon. Although the news is not yet confirmed at the time of this posting (several sources close to the situation have raised the alarm), it\u2019s a safe bet that confirmation is just around the corner.<\/p>\n<p>A hacker called Peace is claiming responsibility. The breach, which was first noticed in the summer, hasn\u2019t been officially confirmed by Yahoo; however, if it is, it\u2019ll sit alongside some of the largest breaches in recent times.<\/p>\n<p>It comes at a sensitive time for Yahoo. The company is currently finalizing plans for its sale to telecom giant Verizon, so news like this won\u2019t go over well. Until details are released about the breach, it will be difficult to see just how much data the hacker has.<\/p>\n<p>Even though the breach is yet unconfirmed, we urge users to <a href=\"https:\/\/help.yahoo.com\/kb\/SLN27051.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">reset their passwords<\/a> as soon as they can. You can learn how to create complex passwords by using our <a href=\"https:\/\/password.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">password checker<\/a>, and as we always say: Make sure you <a href=\"https:\/\/help.yahoo.com\/kb\/SLN5013.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">enable two-step authentication<\/a>!<\/p>\n<h3>Update: it\u2019s confirmed<\/h3>\n<p>Yahoo <a href=\"https:\/\/yahoo.tumblr.com\/post\/150781911849\/an-important-message-about-yahoo-user-security\" target=\"_blank\" rel=\"noopener nofollow\">says<\/a>: \u201cWe have confirmed that a copy of certain user account information was stolen from the company\u2019s network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers.\u201d<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Breaking?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Breaking<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/News?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#News<\/a> 500 Million <a href=\"https:\/\/twitter.com\/hashtag\/Yahoo?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Yahoo<\/a> accounts stolen by State-Sponsored Hackers <a href=\"https:\/\/t.co\/QHIjEYheDh\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/QHIjEYheDh<\/a> via <a href=\"https:\/\/twitter.com\/Mike_Mimoso?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Mike_Mimoso<\/a> <a href=\"https:\/\/t.co\/F4pOq7Lncs\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/F4pOq7Lncs<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/779048365153783810?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u201cFirst, do not fall for social engineering schemes that will follow this incident. Everyone should be aware that any breach notice that Yahoo! emails out will go only to their email service users, and it will not provide links to click on, include any attachments, and will NOT ask for personal information.\u201d<\/p>\n<p>In the meantime, if you are using a Yahoo! email account, it\u2019s a good idea to set up a \u201cYahoo account key,\u201d which removes the need to enter passwords and enables a level of two factor authentication,\u201d says Kurt Baumgartner, principal security researcher, Kaspersky Lab.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yahoo is expected to announce a \u201cmassive\u201d data breach soon. Although the news is not yet confirmed, you should be proactive and check the security of your Yahoo account.<\/p>\n","protected":false},"author":437,"featured_media":13050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1815,961,187,43,914,97,780],"class_list":{"0":"post-13047","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-e-mail","9":"tag-leaks","10":"tag-passwords","11":"tag-privacy","12":"tag-private-data","13":"tag-security-2","14":"tag-yahoo"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/possible-yahoo-password-leak\/13047\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/possible-yahoo-password-leak\/7682\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/possible-yahoo-password-leak\/7686\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/possible-yahoo-password-leak\/7727\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/possible-yahoo-password-leak\/9139\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/possible-yahoo-password-leak\/9004\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/possible-yahoo-password-leak\/13157\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/possible-yahoo-password-leak\/2428\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/possible-yahoo-password-leak\/13047\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/possible-yahoo-password-leak\/5422\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/possible-yahoo-password-leak\/8755\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/possible-yahoo-password-leak\/12643\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/possible-yahoo-password-leak\/13157\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/possible-yahoo-password-leak\/13047\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/e-mail\/","name":"e-mail"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=13047"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13047\/revisions"}],"predecessor-version":[{"id":24267,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/13047\/revisions\/24267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/13050"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=13047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=13047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=13047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}