Last Updated on by SCARS Editorial Team
RSN™ Special Report: It’s Time To Leave Yahoo Mail
It’s Been Two Years Since Yahoo’s Data BreachData Breach Whenever private information is seen by someone who should not have access, this is known as data exposure. It may also sometimes be referred to as a data leak or data breach. It might happen by accident or be caused by hackers who do it to cause harm to the individual or organization involved. It can be especially damaging to companies that store the credit card details and personal information of their customers. – What Have You Done To Stay Safe?
Far Too Often Victims Believe “THEM, NOT ME”
Except, 3 billion Yahoo accounts were hacked
The massive data breach can be an opportunity to do some cleanup and implement security recommendations.
If you had a Yahoo account in 2013, your name and password were stolen. Not maybe, they were!
Yahoo expanded the scope of its massive data breach on Monday. In December, the Internet giant announced a hack that affected over a billion accounts, making it by far the largest data breach in history. Now, the company says that every Yahoo account in existence in 2013—more than 3 billion—was breached. The hackers walked away with password hashes that can be easily cracked.
If you’re a Yahoo user you should consider yourself betrayed.
Your password was compromised and you should take all the necessary steps to secure all of your accounts.
Of course, you should follow all of Yahoo’s recommendations for securing your Yahoo account, such as changing your password and watching for suspicious account activity, but perhaps it is also time to demonstrate that enough is enough and simply walk away from unsafe online services such as: Yahoo mail, Google+, Google Hangouts, and many more. You may not even know what services you have signed up for – many people do not. One way to find out is to take a day and go through old emails and see. Cancel what you do not use.
Here are a few more advanced tips that you should have in mind.
Never Reuse Passwords
There are many secure password management solutions available today that work across different platforms. There’s really no excuse for not having unique, complex passwords for every single account that you own. If you do want memorable passwords for a few critical accounts use passphrases instead: sentences made up of words, numbers and even punctuation marks.
Change your passwords to use passphrases: two or three word phrases with punctuation and numbers!
According to Yahoo, this breach happened in August 2013, at a time when the company hadn’t yet switched to the more secure “bcrypt” password hashing algorithm. As a result, most passwords that were stolen are in the form of “MD5” hashes, which are highly vulnerable to cracking.
If you made the mistake of using your Yahoo password elsewhere and haven’t changed it yet, you should do so immediately and review the security settings of those accounts too.
It’s very likely that hackers have already cracked your password and had three years to abuse it.
Two-Factor Authentication Everywhere
Turn on two-factor authentication—this is sometimes called two-step verification—for any account that supports it. This will prompt the online service to ask for a one-time-use code sent via text message, phone call, email or generated by a smartphone app when you try to access the account from a new device. This code is required in addition to your regular password, but if you stay with Yahoo they also have a feature called Account Key that does away with regular passwords completely and instead requires sign-in approval via phone notifications.
Two-factor authentication is an important security feature that could keep your account secure even if hackers steal your password.
Don’t Save Emails You Don’t Need
Because space is no longer a problem with most email services, users tend to never delete emails. While that’s extremely convenient, it’s not a very good idea, because it allows hackers to easily discover what other online accounts are tied to that address by searching for sign-up or notification emails from various online service providers. Sadly in this digital age, get a paper notebook, like a “Moleskin” and keep a record of your accounts.
Aside from exposing the link between your email address and accounts on other websites, sign-up and notification emails can also expose specific account names that you’ve chosen and are different from the email address.
You might want to consider cleaning your mailbox of welcome emails, password reset notifications and other such communications. Sure, there might be other ways for hackers to find out if you have an account on a certain website or even a number of websites, but why make it easier for them to compile a full list?
Check Your Email Forwarding And Reply-To Settings
Email forwarding is one of those “set it and forget it” features. The option is buried somewhere in the email account settings and if it’s turned on there’s little to no indication that it’s active.
Hackers know this. They only need to gain access to your email account once, set up a rule to receive copies of all your emails and never log back in again. This also prevents the service from sending you notifications about repeated suspicious log-ins from unrecognized devices or IP addresses.
Another technique that attackers might use to get a copy of your emails is to change the reply-to address in your email settings, although this is noisier and can be spotted more easily than a forwarding rule.
The reply-to field is included in every email message that you send and allows the recipient’s email client to automatically populate the To field with an address you chose when they hit reply. If a hackerHacker A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Oppositely, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conducting warrantless activities), and employed by State actors as a weapon of both legal and illegal warfare. changes the reply-to value with an address that he controls, he will receive all email replies intended for you and these typically include the original emails that you sent.
In order to ensure that you also get those replies, the attacker can set up a forwarding rule in their own email account and automatically forward those replies to your address.
To check for “reply-to” changes just send yourself an email from your account and look at the reply address!
Phishing Follows Breaches
Large data breaches are typically followed by email phishing attempts, as cybercriminals try to take advantage of the public interest in such incidents. These emails can masquerade as security notifications or account login alerts, can contain instructions to download malicious programs that are passed as security tools or can direct users to websites that ask for additional information under the guise of “verifying” accounts.
Be on the lookout for such emails and make sure that any instructions you decide to follow in response to a security incident came from the affected service provider or a trusted source. Official Yahoo emails are easily recognizable in the Yahoo Mail interface because they are marked with a purple Y icon. The same tends to be true in other services from Gmail to Facebook.
Never click a link in an email unless you are absolutely sure it is real!
In the future, be selective in what personal information you choose to share and which websites you choose to share it with, even when those websites are legitimate. There’s no guarantee that they won’t be hacked in the future and you simply don’t know how securely they store your details.
In Yahoo’s case, the compromised account information includes names, email addresses, telephone numbers, dates of birth and, in some cases, unencrypted security questions and answers.
These details can be used to impersonate you or to authenticate you on other websites.
Don’t provide real answers to security questions, if you can avoid it. Make something up that you can remember and use that as an answer.
Time To Cut The Cord
Lastly, think about cutting the cord on all accounts that you do not use on a weekly basis.
What is you are not sure you have an account? Go to a service you suspect that you had an account with, and try a password reset using your email address(s). If it accepts the email address then you know there is an account under that email. Reset the password, enter the account and delete it.
Sadly, that probably should include Yahoo itself!
That is our recommendation!
a division of SCARSSCARS SCARS - Society of Citizens Against Relationship Scams Inc. A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims. Visit www.AgainstScams.org to learn more about SCARS.™
Miami Florida U.S.A.
– – –
Tell us about your experiences with Romance Scammers in our Scams Discussion Forum on Facebook »
– – –
FAQ: How Do You Properly Report Scammers?
It is essential that law enforcement knows about scamsScams A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. & scammers, even though there is nothing (in most cases) that they can do.
Always report scams involving money lost or where you received money to:
- Local Police – ask them to take an “informational” police report – say you need it for your insurance
- Your National Police or FBIFBI FBI - Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes, including financial fraud. (www.IC3.gov)
- The Scars Worldwide Reporting Network HERE or on www.Anyscam.com
This helps your government understand the problem, and allows law enforcement to add scammers on watch lists worldwide.
– – –
Visit our NEW Main SCARS™ News & Information Facebook page for much more information about scams and online crime: www.facebook.com/SCARS.News.And.Information
To learn more about SCARS visit www.AgainstScams.org
Please be sure to report all scammers HERE or on www.Anyscam.com
All original content is Copyright © 1991 – 2018 SCARS All Rights Reserved Worldwide & Webwide – RSN/Romance Scams Now & SCARS/Society of Citizens Against Romance Scams are all trademarks of Society of Citizens Against Romance Scams Inc.