Gartner Blog Network


‘One Billion’ affected by the Yahoo hack

by Jonathan Care  |  December 15, 2016  |  Submit a Comment

3500

As reported in the news, Yahoo have been not so much popped, as exploded.

I think the key points here are:

  • Passwords as an authentication technology are rapidly becoming obsolete. We’re seeing many more internet organisations using familiarity signals and behavioural biometrics to authenticate customers.
  • The good-old-bad-old knowledge based authentication is flawed. For better or for worse, the compromise of Yahoo shows that this information is not the “high-memorability low-latency” that was thought. For example, you can look on my Facebook profile, find an entity I’m linked to who is my mother, and she lists her maiden name as Wilks. We need to look at more intelligent ways of identity proofing and indeed, evolve this away from a one-off process to a continuous dynamic risk assessment, coupled with authentication and online fraud detection.
  • Of concern is Yahoo’s statement that they have not yet been able to identity the intrusion associated with this theft. The implication is that Yahoo has overly focused on deploying protective technologies, and has not put in place effective analytics, detection and response systems and processes. Gartner recommends that organisations must engage in a fourfold strategy of:
    1. Predicting threats and understanding risk
    2. Protecting the organisation against threats
    3. Detecting threats in the clear and certain anticipation that there are well resourced, well-funded adversaries with skills and time that are in excess of our own. In addition it should be noted that the risk of insider threat rises when a company is in a turbulent process such as an acquisition or even downturn.  We need to deploy machine analytics
    4. Responding with a well-rehearsed incident process to remedy an attack and restore normal business operation. This in many ways is the key role of the modern CISO – not to be the defender of the battlements, but to ensure business survivability]##].
  • From what we do know, they attackers made use of cookie masquerading, pass-the-hash, and a state-sponsored actor. This gives strength to the importance of a strong detection plan as per 3c above.  MD5 hashing is vulnerable to an attack type called “collision attacks” which means that an attacker can find a string of characters that will resolve to the same hash as a hashed (or encrypted password). MD5 is strongly deprecated and this points to troubling software development security practices in Yahoo or its suppliers.

It’s clear that there will be an impact on the proposed acquisition, and the markets are reacting to the news. It is disturbing that it has taken so long for the breach to be made public in the light of the data breach notification laws in the USA and elsewhere.

Clearly the upshot of this is that we need to realise that it’s no longer a case of “if we’re targeted/unlucky”  but that we are all targets.

Category: breach  cybersecurity  

Tags: breach  

Jonathan Care
Research Director
1 years at Gartner
22 years IT Industry

Jonathan Care expertise includes payment systems, cybersecurity, fraud detection and prevention applications, authentication, identity proofing, identity theft, and insider threats. He also covers the PCI compliance program, tokenization and the security aspects of payment systems. Read Full Bio




Leave a Reply

Your email address will not be published. Required fields are marked *

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.