Why Yahoo and the Year of Living Dangerously
If there is a lesson to be drawn from Internet search giant Yahoo’s hellish past year, it is a grimly illustrative one: Never assume a cybersecurity disaster can’t get worse.
Last September, the Internet portal disclosed that it had suffered the most damaging and far-reaching data breach in history — only to then announce in December the discovery of a second, earlier, and even larger hack.
Since the discovery, the sale of the company to Verizon has been put in jeopardy, as Yahoo — which recently announced its name would be changing to “Altaba” — began a probe into the hack that is expected to take several weeks. We may not know the full extent of these hacks’ effects for years; indeed, it took years for the breaches to even be discovered.
What is known is that these travails were a long time coming. The Yahoo hacks were not acts of God, falling from the sky and striking an unlucky victim; they were the direct result of the corporation’s continual neglect of information security as a vital priority for doing business.
The tragedy of Yahoo’s troubles is not merely that its systems were compromised; that is a risk even the most secure online servicers may face. Rather, it is Yahoo’s lack of attention to cybersecurity, such that it was unable to detect and respond to the breach, making a very bad situation into a nightmarish one.
In 2014, hackers gained access to Yahoo’s main user database, pilfering credentials and personal information from at least 500 million accounts in what was the biggest data breach in history.
Perplexingly, the theft went undiscovered until September 2016, when 200 million sets of user credentials appeared for sale on a darknet website. Yahoo’s failure to identify a breach of such gargantuan magnitude — one that it would somewhat ominously claim to be a “state-sponsored” act (an accusation rejected by researchers) — was a dark portent of things to come.
The hack reported last December seems to be worse — much worse. That hack, which is believed to have occurred in August 2013, resulted in at least 1 billion accounts suffering theft of personal information like names, phone numbers, and dates of birth. Perhaps even more damaging was the hackers’ theft of poorly encrypted Yahoo passwords, as well as unencrypted answers to security queries like “What is your mother’s maiden name?” or “What was your first car?” That information is meant to easily allow users to confirm their identities when resetting account details.
Some sensible security protocols and simple, low-cost encryption could have prevented this calamity. Adding insult to injury, the theft was not discovered until government investigators and private data analysts examining the first reported hack found evidence that a mysterious “third-party” had gained access to other Yahoo data.
Incredibly, these thefts — the largest and most damaging hacks in Internet history — were perhaps not even the lowlight of Yahoo’s year. That honor would belong to CEO Mayer’s decision, at the behest of a U.S. intelligence agency, to scan the content of all Yahoo users’ emails for specific phrases or attachments, a massive warrantless spy program so invasive that Yahoo’s security team, uninformed of the effort, initially thought it was a hack.
It is not enough that Yahoo’s security posture is moribund — not only unable to prevent successive blitzes against billions of its users, but even to detect their occurrence. Worse, in this instance, is the fact Yahoo is as fully complicit as any hacker in exposing its customers’ most sensitive personal communications: It did so without permission, simply at the demand of a government agency bearing no warrants or probable cause.
What, then, will be the fallout of Yahoo’s year of living dangerously? Given the enormous potential for secondary fraud on other sites using Yahoo account credentials, forcing password resets now, years after the crime, is both entirely necessary and woefully inadequate.
After years of criminals likely trading Yahoo user information on darknet marketplaces for cash, this attempt to rectify the situation is equivalent to changing the vault’s combination a couple of years after a safecracker robbed the bank. In an information technology environment where Internet users commonly recycle the same credentials across the dozens of sites they regularly use, password reuse attacks are a growing threat.
Such an attack against Yahoo users has precedent, and the results could be frightening. In 2012, the login credentials of as many as 167 million accountson business networking site LinkedIn were stolen by hackers, emerging again on darknet auction sites in May 2016.
The compromised information, which, as with Yahoo, included poorly encrypted passwords, is believed to have been responsible for numerous large-scale “password reuse” secondary attacks, including one major attackagainst cloud hosting platform Dropbox and 60 million of its accounts.
Given the potential for wreaking havoc, Yahoo’s inadequate and outdated password encryption could have severe consequences, affecting even sites that securely encrypt their customers’ passwords, through no fault of their own. This is the nightmare made possible through the theft of reused passwords: a concatenating wave of data breaches affecting website after website.
Beyond these technical threats, Yahoo’s lack of transparency in combating information theft has further endangered Internet users. It is becoming clear that under Mayer’s leadership, Yahoo downgraded the importance of instituting much-needed cybersecurity measures, fearing that it would alienate a fickle user base with annoying new security requirements. However, the end result will be far worse reputational damage.
A user experience that results in hackers compromising every one of your Web accounts, or stealing your identity, is far worse than the inconvenience of signing into an email account using two-factor identification.
This short-sightedness extended to Yahoo’s public relations reaction: While the company would ultimately estimate that a half billion accounts were affected in the 2014 hack, the true number may be as high as 3 billion; and while Yahoo may claim any affected accounts are being identified and reset, its inability to detect even larger breaches is more than enough reason to doubt the effort’s efficacy.
Fortunately, this debacle need not be entirely in vain, if some simple lessons can be absorbed. Had Yahoo made modest, sensible improvements in its security posture, the hackers might have been dissuaded from attempting such an ambitious heist, or at least been frustrated in their attempts to do so.
Cyber risk is an unavoidable aspect of Internet business today, and even in the worst-case scenario of a breach, reasonable precautions and rapid action can prevent extensive damage.
For example, when “drag-n’drop” website creator Weebly suffered a hackaffecting 43 million of its users, the company’s ready cooperation with observers who discovered the attack helped it to quickly issue password resets, while its strong password encryption further prevented customer sites from being accessed.
The latest breach revelation may derail Verizon’s planned $4.83 billion acquisition of the search giant, but that would hardly be the greatest cost of Yahoo’s incompetence.
As always, the people who will most suffer are the consumers to whom Yahoo owes its responsibility. They entrusted Yahoo with their personal information — a trust the former No. 1 search engine has inexcusably betrayed.