ELEC-E7470 - CYBERSECURITY L CASE STUDY: YAHOO 2016 INFORMATION LEAK REVELATIONS - MYCOURSES

Page created by Debra Delgado
 
CONTINUE READING
ELEC-E7470 - CYBERSECURITY L CASE STUDY: YAHOO 2016 INFORMATION LEAK REVELATIONS - MYCOURSES
ELEC-E7470 - Cybersecurity L
      Case Study: Yahoo 2016 information leak
                    revelations

                   Tuomas Rantataro, Si Zuo, and Yang Xiao

                                  Team: Bicycle

1   Case Introduction
In September 2016, Yahoo confirmed a massive security breach that hackers
swiped personal information associated with at least 500 million account that
took in place in 2014, disclosed that a different attack in 2013 compromised more
than 1 billion accounts.

”This is the biggest data breach ever,” said well-known cryptologist Bruce Schneier.

The incident is a big deal, since so many have a Yahoo account of some type or
other for email or finance or fantasy sports and so on. In the official statement
given by Yahoo, The account information may have included names, email ad-
dresses, telephone numbers, dates of birth, hashed passwords (the vast majority
with bcrypt) and, in some cases, encrypted or unencrypted security questions
and answers. The ongoing investigation suggests that stolen information did not
include unprotected passwords, payment card data, or bank account informa-
tion; payment card data and bank account information are not stored in the
system that the investigation has found to be affected. Based on the ongoing in-
vestigation, Yahoo believes that information associated with at least 500 million
user accounts was stolen and the investigation has found no evidence that the
state-sponsored actor is currently in Yahoos network.1

Yahoo, as one of the internets busiest sites with one billion monthly users that
is one of the oldest free email services, have many users built their digital iden-
tities around it, from their bank accounts to photo albums and even medical
information. Even though it is too early to say what impact the breach might
have on Yahoo and its users because many questions remain, including the iden-
tity of the state-sponsored hackers behind it. But there are already some impact
to Yahoo users and stakeholders. As Yahoo confirmed the stolen user informa-
tion was being used primarily for spamming, i.e., sending spam to the people
whose information was stolen. But since such info can often be passed around
widely among criminal hackers, its always possible it could be used for more ne-
farious purposes. In the meantime, hackers posted to underground forums and
online marketplaces what they claimed was stolen Yahoo data and offering a
large collection of stolen Yahoo credentials including user names, easily cracked
passwords, birth dates, ZIP codes and email addresses on a underground site
where hackers can buy and sell stolen data. An infamous cybercriminal named
Peace claimed on a website that he was selling credentials of 200 million Yahoo
users from 2012 on the dark web for just over $1,800. And the underground site
uses Tor, the anonymity software, and Bitcoin, the digital currency, to hide the
identities of buyers, sellers and administrators who are trading attack methods
and stolen data.2 Whats more, It will take Yahoo months and years time before
it regain users trust. Since Yahoo is a major webmail provider, theres one extra
problem: any further service which has password reset emails sent to a Yahoo
Mail account should also be considered compromised, and passwords accordingly
changed.

”When a company has allowed their customers’ data to fall into the hands of
criminals, the resulting lack of trust is difficult to repair,” CEO Ebba Blitz said
in a statement.

And there has possible larger implications for the $4.8 billion sale of Yahoos core
business which is at the core of this hack to Verizon. The scale of the liability
could bring untold headaches to the new owners. Shareholders are likely to worry
that it could lead to an adjustment in the price of the transaction. That deal
is now moving to completion, but the companies cannot be integrated until it
is approved by a number of regulatory agencies, as well as Yahoo shareholders.
Representatives of Verizon and Yahoo started meeting recently to review the
Yahoo business, so that the acquisition would run smoothly once complete.3

But the good news is that Yahoo says the passwords were hashed, meaning that
the hackers much spend much more time decrypt a single user password, unless
the user use simple common password and simple or obvious security questions
and answer.

2   Case Analysis

Yahoo said on 22 Sept,”2016 that at least 500 million of its accounts were hacked
in 2014 by what it believed was state-sponsored actors, thieves that appeared to
be the world’s biggest known cyber breach by far.”

However, according to the report by Infoarmor, ”Yahoo was compromised in
2014 by a group of professional blackhats who were hired to compromise cus-
tomer databases from a variety of different targeted organizations. Some of their
initial targets, which occurred in 2012 and 2013, are linked directly with the
recent large scale data breaches of social media networks and online-services
such as MySpace, Tumblr and LinkedIn. Other well-known brands have been
impacted by this group but the data stolen from them is not currently available
for sale or validation in the underground.”4 A association called ”Group E” is
mentioned in the report, group of professional blackhats from Eastern Europe,
is considered has direct relation to Yahoo hack in 2014.

On 15th March, 2017, the U.S. Justice Department unsealed indictments against
four men accused of hacking into a half-billion Yahoo email accounts. ”Two of
the men worked for a unit of the Russian Federal Security Service (FSB) that
serves as the FBIs point of contact in Moscow on cybercrime cases. Another one
is Karim Baratov ,a Canadian and Kazakh national who lives in Canada. ”5 .
More details will be discussed in the later part.

For the data breach in 2014, some security experts noted that:”the majority
of Yahoo!’s passwords used the bcrypt hashing algorithm which is considered
difficult to crack, the rest used the older MD5 algorithm which can be broken
rather quickly.”4 . Such information, especially security questions and answers,
could help hackers break into victims’ other online accounts.

According to Yahoos chief information security officer, Bob Lord,”the hackers
used ’forged cookies’ bits of code that stay in the users browser cache so that
a website doesnt require a login with every visit”. ”The cookies’could allow an
intruder to access users accounts without a password by misidentifying anyone
using them as the owner of an email account. The breach may be related to theft
of Yahoos proprietary code”, Lord said.

Infoarmor also mentioned that, ”by evaluating a sample of records, more confu-
sion is created because the decrypted passwords from some of them were legiti-
mate for actual Yahoo users. However, the vast majority of the data is not legit-
imate, including invalid accounts, deleted accounts, and nonexistent accounts.
After extensive analysis and cross reference against the data breach intelligence
systems of Infoarmor, it was determined that the dump is based on multiple
third party data leaks, which have no relation to Yahoo. Presumably, the threat
actor specially misrepresented this data set in order to sensationalize and sell
it for the purpose of monetizing his efforts following the negative impact of his
relationship with tessa88”.

”Since individuals reuse exactly the same passwords for multiple online-services,
some low level of positive conversion rate is inevitable, making ATO possible
with a very small number of user accounts and may explain the positive valida-
tion of this limited number of accounts.”3

As for the data breach occurred in August 2013,Yahoo stated this was a sepa-
rate breach from the late 2014 one and was conducted by an ”unauthorized third
party”.7 Similar data as from the late 2014 breach had been taken from over 1
billion user accounts.Yahoo! had been able to identify that the method that data
was taken from the last 2014 hack using fake cookies during this investigation,
but the method of the August 2013 breach was not clear to them upon their
announcement.

In todays connected world, were sharing more personal information online than
ever before. And its not only when were sitting at our computers: we use our
mobile devices to shop, bank, conduct business, and connect with friends. In the
age of Information, personal information or user data of a company become ex-
tremely important.In a digital age, data is the where the value of a company or
a person are. As technology progresses,all of our information moves to the digi-
tal world, and,consequently, cyber attacks are becoming the new way of crime.
Based on the research of Infoarmor, ”the thieves are not state-sponsored actors,
instead they are a group of professional blackhats who used to sell the personal
data for money.”

As described in the report from Infoarmor, ”tessa88, registered on several un-
derground communities, was the first to mention that Yahoo account credentials
were available for sale. Initially tessa88 proposed several databases for sale, in-
cluding VK, MySpace, Fling and other notable e-mail providers and some instant
messaging services from Eastern Europe.”4
A list of selling information can be seen from the figure 1 from InfoArmor4 .

                Fig. 1. Selling information from account ”tessa88”
3   Responses to the Yahoo hacks
Due to the massive amount of people the hacks have affected, they have caused
responses from wide range of different actors. There have been criminal investi-
gations to both Yahoo and the hackers, articles by security authorities on what
went wrong, and surprisingly small financial consequences to Yahoo.

The company itself posted blog posts after both big breaches were made public,
and also sent emails to the affected users.8 9 The messages were straightforward
in admitting that the hacks had taken place, what information was stolen, and
what Yahoo had already done to secure the user accounts. They also included
suggestions what the user can do to keep his account more secure in the future.
The emails were made acknowledging that similar phishing emails were already
being sent and used the best practices of sending such emails. They included no
links or attachments, and also warned against such threats in phishing emails.
Therefore it can be said that Yahoo handled communication to its users quite
well, when they eventually told to outside world about the breaches. There are,
however, accusations that the company knew about the breaches much earlier,
but tried to keep it quiet hoping it would go away without release of the data.10

The accusations that Yahoo’s leadership knew about the hacks much earlier than
September 22nd has lead to other responses. Some of the most serious ones are
related to planned buyout of Yahoo by Telecommunications company Verizon.
The company claimed as late as two weeks before the 22nd September rele-
vations that the company was unaware of any security breaches, unauthorised
access or unauthorised use of its IT systems.10 The misleading statement may
have led to overvaluation of the company during the purchase negotiations. The
U.S. Securities and Exchange Commission (SEC) has opened an investigation
on Yahoo because of this reason.

In addition to SEC, other countries’ government regulators have also took in-
terest in the breaches. However, the regulators have mostly been information
security and privacy authorities, in contrast to the financial nature of SEC. In
the UK, Information Commissioners Office, which is tasked with protecting in-
formation rights of the people, has been asking questions from Yahoo. In Ireland,
too, the Data Protection Commissioner has been in contact with the US gov-
ernment to ask question about the breach. The role of these privacy agencies
has earlier been mostly giving guidance, but there has been signs of the agencies
planning to take a more punitive approach in privacy breaches. One example of
this is new European Union data protection laws coming to force in 2018, which
”will require companies to improve privacy and disclosure policies or risk heavy
fines.”11

While there has been reponses from organizations, another interesting thing to
follow has been how Yahoo’s users have reacted to the theft of their private in-
formation with possibly great consequences. In addition to the regular advice of
changing passwords and avoiding reusing same passwords elsewhere, Germany’s
Federal Office for Information Security has even recommended switching email
provider to a more secure one.12 However, these measures have apparently have
had little effect on users’ usage of Yahoo’s services.13

4   Conclusion

The Yahoo hacks are currently world’s biggest hacks when counted by users
affected. The hacks show that many different parties, such as state-sponsored
hackers, may target even a single organization, and may succeed if the organiza-
tion is not well enough prepared against such threats. Responses to these kind
of attacks are still varying very much, with privacy and financial organizations
coming up with ways to force companies to secure their data well enough to
avoid breaches as big as these.

References

1. An Important Message About Yahoo User Security(22, SEP, 2016)
     https://yahoo.tumblr.com/post/150781911849/an-important-message-about
   -yahoo-user-security
2. Nichole, P. Yahoo Says Hackers Stole Data on 500 Million Users in 2014(22, SEP,
   2016)
     https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html?_r=0
3. Kara, S. Yahoo is expected to confirm a massive data breach, impacting hundreds
   of millions of users (22, SEP, 2016)
     https://www.recode.net/2016/9/22/13012836/yahoo-is-expected-to-confi
   rm-massive-data-breach-impacting-hundreds-of-millions-of-users
4. InfoArmor: Yahoo Data Breach Investigation (28 , SEP, 2016)
     https://www.infoarmor.com/infoarmor-yahoo-data-breach-investigation/
5. Four Men Charged With Hacking 500M Yahoo Accounts(15, Mar , 2017)
     https://krebsonsecurity.com/2017/03/four-men-charged-with-hacking
   -500m-yahoo-accounts/
6. AN G. Yahoo says half a billion accounts breached by nation-sponsored hackers(22
   , SEP , 2016)
     https://arstechnica.com/security/2016/09/yahoo-says-half-a-billion-a
   ccounts-breached-by-nation-sponsored-hackers/
7. Yahoo Says 1 Billion User Accounts Were Hacked,By VINDU GOEL and NICOLE
   PERLROTHDEC. (14, DEC , 2016)
     https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html
8. Important Security Information for Yahoo Users (21, APR, 2017)
     https://yahoo.tumblr.com/post/154479236569/important-security-informa
   tion-for-yahoo-users
9. An Important Message About Yahoo User Security (21, APR, 2017)
     https://yahoo.tumblr.com/post/150781911849/an-important-message-about
   -yahoo-user-security4
10. SEC opens formal probe of Yahoo hacking disclosure (21, APR, 2017)
    https://www.ft.com/content/2bebc10e-e18b-11e6-8405-9e5580d6e5fb
11. Yahoo faces questions over delay in data breach revelation (21, APR, 2017)
    https://www.ft.com/content/54ec6bd8-818e-11e6-8e50-8ec15fb462f4
12. White House says FBI is investigating hack of 1bn Yahoo user accounts (21, APR,
   2017)
    https://www.theguardian.com/technology/2016/dec/15/fbi-investigation
   -yahoo-hack-one-billion
13. Turns Out Consumers Stay Loyal to Companies After Hacks (21, APR, 2017)
    https://www.wired.com/2016/09/hacks-like-yahoos-new-normal/
You can also read