Skip to main content

Yahoo! Voice hacked; 400,000+ login credentials dumped online

Hackers belonging to a hacking collective called D33Ds Company have retrieved and dumped login details of more than 400,000+ user accounts in plain text. A post on Trustedsec stated, "The passwords contained a wide variety of email addresses including those from yahoo.com, gmail.com, aol.com, and much more." Interestingly, the post adds that the affected website is a sub-domain of yahoo.com, and that the compromised server may be Yahoo! Voice a.k.a Associated Content. "The affected website was only named as a sub-domain of yahoo.com. However, digging through and searching for the hostname, the attacker forgot to remove the hostname “dbb1.ac.bf1.yahoo.com” (credit to Mubix for the hostname find)," Trustedsec wrote. The most worrisome bit here is that the passwords that were stored were completely unencrypted, and as you're reading this, 400,000+ login credentials (comprising usernames and passwords) have been exposed.

It has been brought to light that the hackers used a union-based SQL injection attack to get away with the information stored in the database. The post on Trustedsec also put forth a glimpse of what the data leaked online looks like (can be seen in the image below). 


A note at the end of the dump reads, "We hope that the parties responsible for managing the security of this sub-domain will take this as a wake-up call and not as a threat. There have been many security holes exploited in webservers belonging to Yahoo! Inc. that have caused far greater damage than our disclosure. Please do not take them lightly. The sub-domain and vulnerable parameters have not been posted to avoid further damage."

Reporting on the issue, Ars Technica's Dan Goodin wrote that the union-based SQL injection hacking technique used here affects inadequately secured web applications that do not "properly scrutinize text entered into search boxes and other user input fields". He added, "By injecting powerful database commands into them, attackers can trick back-end servers into dumping huge amounts of sensitive information."

Security breach, such as the case in point or the LinkedIn database leak, is emerging as a worrying trend. LinkedIn recently suffered a data breach where passwords of some of the social network's members were compromised. At the time of the incident, LinkedIn engineer Vicente Silveira confirmed on the website's blog that some passwords were "compromised". "We are continuing to investigate this situation," he said.

Comments

Popular posts from this blog

India Become the fourth largest country in android app downloads : GOOGLE

Google's announcements on Thursday brought plenty to cheer to both Android developers and end-users in India. Google announced that Indian developers will be able to monetize their apps via paid applications, in-app products, and subscriptions. Further, Google announced that end users will be able to pay for their purchases in Indian rupees, ensuring greater transparency over the amount charged and, possibly, better deals on apps via country-specific pricing. Google shared these two announcements via a blog post. In the same blog post, Google also shared some interesting stats with respect to Android usage in India. First, the number of activations. According to Google, over the past year, Android device activations in India have jumped more than 400%. It is not clear if Google is referring to the number of activations per day, or the total devices activated till date, but either way, those are impressive numbers. Google added that in the last six months, Android u...

The 101 Most Useful Websites

Here are my picks for the 101 most useful websites of the year. The Most Useful Websites and Web Apps The sites mentioned here, well most of them, solve at least one problem really well and they all have simple web addresses (URLs) that you can easily learn by heart thus saving you a trip to Google. 01.   screenr.com   – record movies of your desktop and send them straight to YouTube. 02.   bounceapp.com   – for capturing full length screenshots of web pages. 03.   goo.gl   – shorten long URLs and convert URLs into   QR codes . 04.   unfurlr.come   – find the original URL that’s hiding behind a short URL. 05.   qClock   – find the local time of a city using a   Google Map . 06.   copypastecharacter.com   – copy special characters that aren’t on your keyboard. 07.   postpost.com   – a better search engine for twitter. 08.   lovelycharts.com   – create flowcharts, network diagrams, ...

Clear Your Sinuses in 20 Seconds with Your Tongue and Your Thumb

Blocked sinuses are no fun, especially when the problem frequently requires taking a pill. Redditor gymfork points to a clever acupressure method that can solve the problem in just 20 seconds: Push your tongue against the top of your mouth and place a finger between your eyebrows and apply pressure. Hold it for about 20 seconds and your sinuses will begin to drain . When you push your tongue against the roof of your mouth, don't aim for a specific point but rather push it flat against the top. When you let go, you should start to feel a little movement in the back of your throat. It's a very simple trick that gets the job done.