Yahoo's valuation dropped from $4.8 billion to $350 million, 32 million accounts leaked due to "cookie forgery"

Yahoo's valuation dropped from $4.8 billion to $350 million, 32 million accounts leaked due to "cookie forgery"

[51CTO.com original article] Yahoo's latest news shows that in the past two years, intruders have carried out "" attacks, resulting in the leakage of 32 million accounts. The information that may have been stolen from users includes names, email addresses, hashed passwords, phone numbers, birthdays, and some encrypted or unencrypted security questions and answers. . It should be noted that this leakage incident is independent and different from the two large-scale data leaks that broke out in the past few months (500 million accounts were leaked in September 2016, and 1 billion accounts were leaked in December).

To make matters worse, Yahoo's series of security incidents have severely damaged Yahoo's credibility with users. Just last month, Yahoo was acquired by Verizon Communications at an ultra-low price of US$350 million, down from an initial valuation of US$4.8 billion.

[[184681]]

Hackers from national backgrounds?

Yahoo said in a regulatory filing on Wednesday that the cookie forgery incident was related to "hackers with a national background" and that the attackers behind the theft of 500 million Yahoo accounts in 2014 were probably the same group of people.

Yahoo believes that an unauthorized third party accessed the company's proprietary code to learn how to forge the appropriate cookies. External forensics experts have determined that nearly 32 million accounts were attacked by cookie forgery in 2015 and 2016. Some of these intrusions are related to state-sponsored attackers associated with the 2014 security incident.

What is a cookie forgery attack?

Through cookie forgery attacks, attackers can access the victim's account without having to enter the password. Using forged cookies, the intruder does not need to steal the password, but only needs to forge a web browser token, i.e., a cookie, to trick the browser into believing that the Yahoo user is logged in.

How do cookies prevent forgery?

In order to save server-side resources, the user login information is generally saved on the client side. At this time, Cookies will be used. However, everyone knows that Cookies can be forged. How to prevent them from being forged?

In fact, it is also very simple. You can add a userkey cookie, the value of which is userId or userName plus a fixed string on the server, and then encrypt it with MD5, MD5(userId+"mysite") or MD5(userName+"mysite"). When the server determines the authority, it first determines whether the userkey is correct. If it is correct, it will perform other operations.

Doing so can largely eliminate the website security issues caused by Cookie forgery. Of course, if users feel that it is not safe enough and think that MD5 can be cracked, they can use multiple encryption methods, such as: sha, base64 and MD5 mixed use. It is difficult for hackers to calculate the userkey without knowing the user encryption algorithm and fixed string.

[51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites]

【Editor's recommendation】

  1. Data center basics: cable management and wiring in data centers
  2. Software Defined Data Center (SDDC) security issues are in the spotlight
  3. Trend analysis: How to make 5G technology more down-to-earth from MWC
  4. Where is the limit of data center network bandwidth?

<<:  Today's encryption mechanisms will be defeated by quantum attacks, except for generalized knapsack codes.

>>:  Juniper is making efforts in the telecommunications market this year: to revive domestic operator business

Recommend

What does 5G high and low frequency networking mean?

[[346977]] This article is reprinted from the WeC...

How to cut data center costs without sacrificing performance?

While organizations are placing greater demands o...

Pivo: $5/month KVM-4GB/40G SSD/2TB/Phoenix Data Center

Pivo claims to have started in 1997(?). The merch...

5G mmWave filters: What is the best solution?

As cellular technology evolves, mobile bandwidth ...

Wi-Fi is getting harder to hack: How to keep your new router secure

With the development of WiFi technology, WiFi has...

What will be the future of the Internet after the heyday?

On April 19, it was reported that the current Int...

After talking so much about 5G, the most critical technology is here

When it comes to antennas, everyone must be famil...

Why does TCP use three-way handshake? Can't two or four-way handshakes work?

The TCP protocol needs three handshakes to establ...

Network Lifecycle Management Guide

The network lifecycle management process helps ne...

A brief tutorial on the Dig command

Hello everyone, I am Xianyu. I don’t know how oft...

Can the United States make China disappear from the Internet?

Let’s talk about an interesting topic today. Ther...