[51CTO.com original article] Yahoo's latest news shows that in the past two years, intruders have carried out "" attacks, resulting in the leakage of 32 million accounts. The information that may have been stolen from users includes names, email addresses, hashed passwords, phone numbers, birthdays, and some encrypted or unencrypted security questions and answers. . It should be noted that this leakage incident is independent and different from the two large-scale data leaks that broke out in the past few months (500 million accounts were leaked in September 2016, and 1 billion accounts were leaked in December). To make matters worse, Yahoo's series of security incidents have severely damaged Yahoo's credibility with users. Just last month, Yahoo was acquired by Verizon Communications at an ultra-low price of US$350 million, down from an initial valuation of US$4.8 billion.
Hackers from national backgrounds? Yahoo said in a regulatory filing on Wednesday that the cookie forgery incident was related to "hackers with a national background" and that the attackers behind the theft of 500 million Yahoo accounts in 2014 were probably the same group of people. Yahoo believes that an unauthorized third party accessed the company's proprietary code to learn how to forge the appropriate cookies. External forensics experts have determined that nearly 32 million accounts were attacked by cookie forgery in 2015 and 2016. Some of these intrusions are related to state-sponsored attackers associated with the 2014 security incident. What is a cookie forgery attack? Through cookie forgery attacks, attackers can access the victim's account without having to enter the password. Using forged cookies, the intruder does not need to steal the password, but only needs to forge a web browser token, i.e., a cookie, to trick the browser into believing that the Yahoo user is logged in. How do cookies prevent forgery? In order to save server-side resources, the user login information is generally saved on the client side. At this time, Cookies will be used. However, everyone knows that Cookies can be forged. How to prevent them from being forged? In fact, it is also very simple. You can add a userkey cookie, the value of which is userId or userName plus a fixed string on the server, and then encrypt it with MD5, MD5(userId+"mysite") or MD5(userName+"mysite"). When the server determines the authority, it first determines whether the userkey is correct. If it is correct, it will perform other operations. Doing so can largely eliminate the website security issues caused by Cookie forgery. Of course, if users feel that it is not safe enough and think that MD5 can be cracked, they can use multiple encryption methods, such as: sha, base64 and MD5 mixed use. It is difficult for hackers to calculate the userkey without knowing the user encryption algorithm and fixed string. [51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites] 【Editor's recommendation】
|
As Matter’s foundational technology, Wi-Fi can he...
Today, RackNerd offers three hot-selling packages...
Recently, H3C, a leading manufacturer in the IP n...
Recently, China Telecom Gansu Company held a pres...
[Bangkok, Thailand, October 28, 2022] Recently, t...
SD-WAN is one of the hottest new network technolo...
5G is developing at an amazing speed The Ministry...
The good times for tech workers will continue int...
CloudCone has updated its 2023 promotional progra...
Web development is inseparable from computer netw...
[[338229]] Some time ago, we discovered that a Sa...
[51CTO.com original article] With the rapid devel...
A router is a core element of internet connectivi...
[51CTO.com original article] The rapid developmen...
Those who are interested in UK VPS can pay attent...