Skip to main content

Yahoo Mail hit by hackers, passwords reset

yahoo mail hit by hackers password

Yahoo said Thursday it had discovered what it described as a “coordinated effort” by hackers to gain access to a number of Yahoo Mail accounts.

In a ‘security update’ message posted on its Tumblr page, Yahoo’s Jay Rossiter declined to say precisely how many accounts had been compromised, but said it had taken “immediate” action and contacted affected users, prompting them to reset their passwords.

There are known to be some 273 million Yahoo Mail accounts globally, with around 81 million based in the US.

Rossiter said a list of usernames and passwords used in the attack “was likely collected from a third-party database compromise” and that there was currently no evidence that personal data had been taken directly from any of Yahoo’s own servers. Of course, this begs the question: From which third-party database was the information pulled? If Yahoo knows, it didn’t want to say.

Describing its investigation as “ongoing,” Rossiter said the company had so far discovered that “malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts.”

Yahoo said that besides contacting those affected, it had already reset passwords on impacted accounts and was using second sign-in verification to enable users to choose a new password. It added that it’s now working with federal law enforcement in an effort to find those responsible, and had implemented “additional measures” in an effort to prevent future attacks on its systems.

The last few months have seen a number of high profile cyberattacks – retail giant Target was hit recently by a hack affecting up to 110 million of its online users, while back in October Adobe reported a serious security breach impacting up to 38 million accounts. 

Whether or not your Yahoo Mail account was compromised in this week’s incident, now is as good a time as any to review your password strategy – especially if you’re using one like this.

 [Image: Zsolt Biczo / Shutterstock]

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
These embarrassing passwords got celebrities hacked
dt10 language and tech motorola razr v3 paris hilton

One thing that celebrities have in common with everyday people is that they are also susceptible to cybersecurity breaches. Many public figures have had their private and public tech accounts hacked over the years and these attacks have often been due to them simply having weak passwords that were easy for bad actors to figure out.

Socialites, actors, politicians, and even prominent tech figures are guilty of lazy password practices, and falling victim to cybercrime that has compromised their passwords.
President Donald Trump

Read more
Hackers may have stolen the master key to another password manager
keepass master password plain text vulnerability open padlock cybersecurity

The best password managers are meant to keep all your logins and credit card info safe and secure, but a major new vulnerability has just put users of the KeePass password manager at serious risk of being breached.

In fact, the exploit allows an attacker to steal a KeePass user’s master password in plain text -- in other words, in an unencrypted form -- simply by extracting it from the target computer’s memory. It’s a remarkably simple hack, yet one that could have worrying implications.

Read more
Hackers are using a devious new trick to infect your devices
A person using a laptop with a set of code seen on the display.

Hackers have long used lookalike domain names to trick people into visiting malicious websites, but now the threat posed by this tactic could be about to ramp up significantly. That’s because two new domain name extensions have been approved which could lead to an epidemic of phishing attempts.

The two new top-level domains (TLDs) that are causing such consternation are the .zip and .mov extensions. They’ve just been introduced by Google alongside the .dad, .esq, .prof, .phd, .nexus, .foo names.

Read more