Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Yahoo Reveals Cookie Forging Activity Led to Account Breach

    Written by

    Sean Michael Kerner
    Published March 2, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Yahoo has been attacked by a variety of different means in recent years, among them is a cookie forging attack the company publicly detailed in its 2016 10-K filing with the U.S. Securities and Exchange Commission (SEC).

      The cookie forging activity was discovered as part of an investigation that Yahoo announced in December 2016 involving a breach of one billion Yahoo user accounts. According to Yahoo’s 10-K filing, the company engaged with third party forensic experts that did an analysis looking for potentially forged cookies.

      A cookie is a widely-used internet approach to storing browser session variables and preferences. Yahoo’s forensic investigators determined that the forged cookies enabled an attacker to access users’ accounts without a password.

      “Based on the investigation, we believe an unauthorized third party accessed the Company’s proprietary code to learn how to forge certain cookies,” Yahoo stated. “The outside forensic experts have identified approximately 32 million user accounts for which they believe forged cookies were used or taken in 2015 and 2016 (the “Cookie Forging Activity”).”

      Yahoo added that it has invalidated the forged cookies so they can no longer be used to access user accounts.

      Using cookies as a way to attack a company is not an entirely new or unique idea and security experts contacted by eWEEK were not all that surprised by Yahoo’s disclosure.

      Nathan Wenzler, chief security strategist at AsTech, a San Francisco, Calif. based security consulting company, commented that session hijacking with cookies is a fairly well-known attack vector for sites that do not secure communications with their users.

      Wenzler explained that many sites will encrypt the communication during login, but leave the rest of the session out in the clear. By leaving some of the browser session in the clear and unencrypted, an attacker can potentially monitor the communication and ultimately, use a forgery of a proper cookie to conduct a man-in-the-middle attack to make it seem like the attacker is the legitimate user.

      “This has become less and less commonplace as the encryption of all sessions is becoming a more common function for most websites, so there are fewer overall incidents to report,” Wenzler said.

      Protecting cookies and browser sessions is generally achieved by encrypting the communication between the user and the site during the entire duration of the session, and not simply at login. Additionally, Wenzler noted that organizations can better manage the cookies they assign to their legitimate users. Among the cookie management techniques Wenzler advocates is to ensure that the session IDs are long and randomly generated, that the cookies are short-lived and are not reused after the existing session is complete, and to regenerate the session ID after login and the encrypted channel is established.

      “For users, it’s always a good idea to log off of websites and services if you’re not using them any longer, as this will forcibly end the session and, ideally, invalidate the session cookie and ID so that it can no longer be used fraudulently by an attacker,” Wenzler said.

      While protection of browser sessions from cookie forgery is important, there is another key aspect to Yahoo’s latest security disclosure. Sanjay Kalra, co-founder and chief product officer at Lacework, a Mountain View, Calif. based provider of cloud security solutions, noted that in his view the main security issue is the third party access to Yahoo’s proprietary code, which enabled the attackers to learn how to forge certain cookies.

      “If the hackers can get to your Cloud/Data Center and access your source code to learn your weaknesses, no amount of defense post-breach is useful,” Kalra told eWEEK. “As first line of defense, enterprises today need to focus on breach detection and insider threat detection to protect their crown jewels in the cloud and data center.”

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.