Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Yahoo Voice hit by hackers: 400,000 passwords online

July 13, 2012

Yahoo is investigating a breach of its system which may have exposed 400,000 user IDs.

US security firm Trustedsec said the attack appeared to have originated from servers connected to Yahoo Voices, a user-generated section of the site.
Over 400,000 usernames and passwords were posted online following what appears to be a hack of voice over IP (VoIP) service Yahoo Voice by hacktivists ‘D33Ds Company’.
The credentials were made available in plain text in a data dump posted online by the hacker collective on Wednesday.
In the document, the group responsible for the breach said that it was intended to be “a wake-up call” for Yahoo.
“We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat,” the hackers wrote.
“There have been many security holes exploited in webservers belonging to Yahoo Inc. that have caused far greater damage than our disclosure. Please do not take them lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage.”
Hours after the attack came to light, Yahoo had not put a warning on its site.
In a statement Yahoo said: “We are currently investigating the claims of a compromise of Yahoo! user IDs,” adding that it encouraged users to “change their passwords on a regular basis”.
The document which gives details of the hack does not make clear which Yahoo service was targeted.
According to US security firm Trustedsec, the compromised Yahoo passwords were associated with a variety of email addresses including those from yahoo.com, gmail.com and aol.com.
It said that hackers used a well-established technique known as SQL injection to extract the sensitive information from the database.
“The most alarming part of the entire story was the fact that the passwords were stored entirely unencrypted,” the security firm said in its blog.
Initial analysis by security firm Impervia suggests that the compromised database may have contained some private data as well including names, addresses including postcode, phone numbers and dates of birth.
Follow Netimperative on Twitter
Keep up-to-date with Netimperative’s daily and weekly newsletters

Uncategorized AOL, email, security, Twitter, Yahoo

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT