• 450,000 Yahoo! Passwords Stolen in Data Breach

    Yahoo! Inc. that have caused far greater damage than our disclosure. Please do not take them lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage."
    However, it turned out the Yahoo! subdomain was in fact included by accident, which tipped off the security company TrustedSec that the user data belonged to Yahoo! Voices, previously known as Associated Content.

    "We confirm that an older file from Yahoo! Contributor Network (previously Associated Content) containing approximately 400,000 Yahoo! and other company users names and passwords was stolen yesterday, July 11," a Yahoo! spokesman told SecurityNewsDaily via email. "Of these, less than 5 percent of the Yahoo! accounts had valid passwords."

    "We are fixing the vulnerability that led to the disclosure of this data, changing the passwords of the affected Yahoo! users and notifying the companies whose users accounts may have been compromised," the spokesman said. "We encourage users to change their passwords on a regular basis and also familiarize themselves with our online safety tips at security.yahoo.com."

    It's worth noting that only about 30 percent of the affected accounts used Yahoo! Mail addresses. The rest used Gmail, Hotmail, AOL and dozens of others.
    The D33ds Company posting said the crew had used a SQL injection attack, in which specially crafted bits of code are inserted into a Web-page form field or browser address bar to make a database behave erratically. SQL injections are fairly common and many database administrators routinely test their systems to prevent such attacks.

    Treasure trove of dumb passwords

    Any time there's a big password breach, security experts get to work analyzing the data.
    Anders Nilsson of the Slovakian security company ESET broke down the Yahoo! Voices data and found that the most common password was "123456," followed by "password" and "welcome." The most common password length was eight characters, and fully one-third of the passwords contained only lower-case letters.
    Yahoo! Voices' administrators made a big mistake storing the passwords in plaintext, but all users need to bolster their own security as well. Make passwords harder to guess by making them more than eight characters long, and pepper them with upper-case letters, numbers and punctuation marks.

    From crisis to crisis

    Yahoo! Voices
    started out several years ago as Associated Content, a so-called "content farm" that aggregated thousands of hastily written articles in an effort to draw search-engine traffic.
    Yahoo! bought Associated Content two years ago, and last December rebranded it as Yahoo! Voices and shifted its focus to content generated by Yahoo! users.
    (Yahoo! Voices should not be confused with Yahoo! Voice, a voice-over-Internet service associated with Yahoo! Messenger, Yahoo!'s instant-messaging service.)

    It's not clear how old the user data is, or whether the decision to store passwords in plaintext was Associated Content's or Yahoo!'s. But Yahoo!'s information-technology team should have corrected the error nonetheless.
    Everyone who's ever registered with Associated Content or Yahoo! Voices should change their passwords for that account immediately, and do the same for any other account that used the same password or registered email address.
    Yahoo! was one of the early Web's first search engines and quickly grew into an all-encompassing "portal," offering news, email and instant-messaging services, movie listings and virtually anything else you could think of doing online.

    But since it refused a buyout offer from Microsoft in 2008, Yahoo!'s been struggling to find its way, with top executives rotating in and out, thousands of employees being laid off and its stock price plummeting.

    In May, Yahoo!'s chief executive officer was forced to resign five months into the job after it was learned he'd falsified his résumé to make it appear he had a degree in computer science.