Categories: Future Tech

Three Steps to Avoid Getting Hacked Like Yahoo

By now you’ve probably heard that hackers were able to breach a Yahoo server and expose more than 450,000 account passwords. No server or network is impervious, but Yahoo’s negligence or incompetence made this attack possible.

It may seem like a wake-up call for protecting servers better, and improving network security, but the reality is that it’s just a reminder that common sense and basic security practices could probably prevent this—and most other—attacks.

Where did Yahoo go wrong? Well, according to Jason Rhykerd, an IT security expert with SystemExperts, Yahoo made three serious mistakes.

1. Unencrypted Passwords

There are many security experts who are using this attack as an opportunity to remind users that they need to create strong passwords. Unfortunately, strong passwords would not have helped in this case. This was a failure of password handling, not a weakness of the passwords themselves.

According to Rob Rachwald, Director of Security Strategy at Imperva, “This breach highlights a disturbing trend in password security: as we saw with last month’s breach of the LinkedIn social network, these passwords were stored in clear text and not hashed.”

2. Network Monitoring

Rhykerd claims that the hackers captured more than 2,000 database tables and/or column names, along with 298 MySQL variables. All of that traffic had to traverse from the Yahoo server to the hackers PCs.

Rhykerd points out that Yahoo should have had some sort of network monitoring in place that would have alerted IT admins to the suspicious amount of data leaving the network. “The amount of network traffic this attack would have generated should of set off the lightest of IDS rules.”

3. Least Privilege Access

The attackers were able to gain complete administrative access to the database server. The concept of least privileged access means that each user or process should have the least amount of privileges necessary to perform their functions. Rhykerd believes–based on the success of the hackers–that least privilege access was not instituted for the application service account.

Slavik Markovich, CTO of Database Security at McAfee, explained, “It is often the case that obvious database vulnerabilities–such as weak passwords and default configuration settings–are initially overlooked and never fully remediated,” adding, “An organization’s sensitive information can never be adequately secured if it lacks dedicated tools and processes to gain complete visibility into their databases’ security weaknesses and eliminate the opportunity for the bad guys to exploit them.”

That may have played a part in this security failure, but the simple fact is Yahoo has been in the Internet business long enough to know better. There’s really no excuse.

Via: PCWorld

Prateek Panda

Prateek is the Founder of TheTechPanda. He's passionate about technology startups and entrepreneurship and enjoys speaking to new founders every day. Prateek has also been consistently regarded as one of the top marketing experts in the region.

Recent Posts

DeepSource’s new autonomous AI agents promise to scan, fix code security vulnerabilities

As artificial intelligence (AI) continues to progress exponentially, the future of industries like software engineering…

12 hours ago

Retail’s Return Rate Crisis: The Urgent Need for Proactive Solutions

The average return rate in eCommerce is estimated at 17.6% for 2024. Nearly 1 in 5 products…

1 day ago

AI Launches: Cybersecurity, AI Agents, product specs, business operating system, automobile, consumer & MSME lending, cloud, data streaming

The Tech Panda takes a look at recent launches in the superfast field of Artificial…

2 days ago

As India’s tech sector on track to surpass $300 billion, CEO of Ness shares insights into AI’s important role 

The tech sector in India has been going from strength to strength in recent years.…

2 days ago

Unknown & uncontrolled machine identities within organizations leading to emergence of new identity security challenges

Experts are saying that organizations are inadvertently creating a new identity-centric attack surface through growing…

2 days ago

Outbound & inbound: India attracts businesses from US & Singapore while expanding to UAE, Europe & Philippines

The Tech Panda takes a look at how India has been attracting foreign businesses from…

3 days ago