Categories: Security

Here’s What We Know About Who Hacked Yahoo

Over the years, Yahoo has failed to implement necessary security measures or changes to their service for fear of pushing their current users away. One could say, shame on them for having a blasé attitude towards cyber security, and, further, for failing to properly update their current users on the information breach. But many critics will respond: shame on those who still use Yahoo. So, despite all of this, how did this happen?

Who’s Responsible for the Yahoo Hack?
The short answer: we still don’t know. Yahoo previously stated that the hack was state-sponsored, meaning that a foreign government is likely responsible. However, InfoArmor, a cybersecurity company based in Arizona, recently claimed that an Eastern European gang was responsible. That gang then sold the stolen information to several clients, one of them being a state-sponsored group. This gang has also been responsible for several other major security breaches, including ones at LinkedIn and Tumblr. Neither answer, however, is definite. The Yahoo hack is still being investigated. It could be a while before there’s a definite answer as to who is responsible, or we may never really know. Unfortunately, cybersecurity breaches can be difficult to track.

Read More: 500 Million Yahoo Accounts Stolen

 The Known Information About the Hack
Yahoo has made plenty of excuses for this breach, one of them being that they couldn’t have prevented the attack. But it has been well documented now that the company didn’t have the right attitude towards security. While cybersecurity threats and large company breaches have become increasingly common, there are measures Yahoo could have taken to make their service more secure.

But this all happened two years ago. How are we just finding out about it now? Earlier this year, an online user bragged about having Yahoo account information for sale. A streak of other clues followed, and the breach was eventually confirmed. A lot of account information was stolen, such as personal information and passwords, and even recovery email addresses.

How to Respond to the Yahoo Cyberattack
This is a big deal. Even if you don’t currently use Yahoo, odds are you at one point had a Yahoo email address (considering how popular it used to be), so it’s a good idea to check on the status of that old account if it’s still around. As with all of your accounts, make sure to practice good password-making habits and to have unique passwords for each account. If you must use security questions, make your answers more complex or misleading. Make sure to be aware of current cyber threats and how you can protect your information. Finally, download PSafe Total and PSafe Total Windows for automatic, 24/7 virus scans on your devices.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago