Hackers publish over 450,000 emails and passwords allegedly stolen from Yahoo

Hackers claim that an SQL injection vulnerability allowed them to steal plain-text log-in credentials from an unnamed Yahoo service

A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service.

The group of hackers calls itself "the D33Ds Company" and claims to have hacked into the database by exploiting an SQL injection vulnerability found on a Yahoo subdomain.

"The subdomain and vulnerable parameters have not been posted to avoid further damage," the hackers said in their release notes.

The leaked information includes MySQL server variables, names of database tables and columns, as well as a list of 453,492 email addresses and passwords in plain text.

The exposed log-in credentials don't only include yahoo.com email addresses, but also email addresses from other public and non-public email providers.

An analysis of the data by Anders Nilsson, chief technology officer at Eurosecure, antivirus vendor ESET's distributor in Scandinavia, revealed that the most common domain names for the leaked email addresses were yahoo.com, gmail.com, hotmail.com and aol.com.

The most common password was "1234546" -- used by 1,666 users -- followed by the word "password" -- seen 780 times. In addition, "password" was used as a base word for 1373 passwords.

Even though the hackers did not name the affected Yahoo subdomain, Dave Kennedy, the chief executive officer of security firm TrustedSec, speculated, based on a host name found in the leaked data, that the service is Yahoo Voices, a library of user-generated content formerly known as Associated Content from Yahoo.

Yahoo was not able to immediately confirm the compromise or name the affected service, if any. "We are currently investigating the claims of a compromise of Yahoo! user IDs," Caroline MacLeod-Smith, Yahoo's head of consumer PR in the UK, said via email. "We encourage users to change their passwords on a regular basis and also familiarise themselves with our online safety tips at security.yahoo.com."

"We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat," the hackers said. "There have been many security holes exploited in webservers belonging to Yahoo! Inc. that have caused far greater damage than our disclosure. Please do not take them lightly."

If someone's log-in credentials are leaked, there isn't much they can do except to change their passwords as soon as possible, pressure the responsible service provider into improving its security and consider moving to a safer service, David Harley, a senior research fellow at antivirus vendor ESET, said in a blog post on Thursday.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place