Yahoo Certificate Security Is ‘Still Poor’ Despite Hack

Yahoo still hasn’t implemented strong digital certificates despite ‘state-sponsored hackers’ stealing the personal information of at least 500 million accounts following a security breach in 2014.

Cybersecurity specialist Venafi conducted research into how well Yahoo reacted to the breach, in particular the cryptographic controls Yahoo still has in place, and said the results were “damning”.

Researchers said Yahoo had still not “taken the action necessary to ensure they are not still exposed and that the hackers do not still have access to their systems and encrypted communications.”

Furthermore Venafi warned that “Yahoo is still using cryptography (MD5) that has been known to be vulnerable for many years now.”

Read More: What next for businesses after Yahoo data breach?

Digital Certificates

Venafi Labs apparently analysed data from TrustNet, a global database of certificate intelligence, and found that 27 percent of the certificates on external Yahoo! websites have not been reissued since January 2015.

Venafi says that when a breach has taken place, replacing certificates is “critical critical mitigation practice” to ensure hackers do not have ongoing access to encrypted communications.

Furthermore it seems that only 2.5 percent of the 519 certificates deployed have been issued within the last 90 days, so it’s likely that Yahoo! does not have the ability to find and replace digital certificates quickly.

“Unfortunately, this is a very common problem, even in very large organisations with a significant online presence,” said the security firm.

Weak Encryption

And Venafi also discovered that a surprising number of Yahoo! digital certificates use MD5, a cryptographic hashing function that can be reversed with brute force attacks.

“MD5 also suffers from many serious, well documented vulnerabilities,” said Venafi. “For example Flame, a family of malware used for targeted espionage by nation states, relied on an MD5 vulnerability.”

It also found that 41 percent of the external Yahoo! certificates in the TrustNet data set use SHA-1, a hashing algorithm that is no longer considered secure against well-funded opponents. Indeed, major browsers will stop accepting SHA-1 certificates in January next year.

“In our experience major breaches, such as the one suffered by Yahoo!, are often accompanied by relatively weak cryptographic controls,” said Alex Kaplunov, vice president of engineering for Venafi.

“To confirm this assumption we took an in-depth look at external facing Yahoo! web properties and the details of how these sites are using cryptography,” said Kaplunov. “We found the encryption practices on these properties to be relatively weak. This is not surprising. In our experience most enterprises, even global brands with deep  cyber security investments, have weak cryptographic controls.”

Yahoo Security

Yahoo is facing ongoing questions about the data breach, and whether it had the necessary security practises and technology in place.

“Any one of these cryptographic issues would leave an organisation extremely vulnerable to attacks on encrypted communication and authentication,” said Hari Nair, director of product management and cryptographic researcher for Venafi.

“Collectively, they pose serious questions about whether Yahoo! has the visibility and technology necessary to protect encrypted communications and ensure its customers privacy,” said Nair. Our research has led us to believe that there is usually a high degree of co-relation between weak cryptographic controls and overall cybersecurity posture”

It should be noted that the 2014 data breach of Yahoo was not the first time the firm has been exposed. In 2012 Yahoo admitted it had been hacked, after more than 450,000 Yahoo passwords had been posted online.

Meanwhile the 2014 breach could affect millions of Sky and BT broadband customers. This is because BT had used Yahoo Mail for its email service until 2013. Even worse is Sky, which still uses Yahoo for its email service.

How well do you know network security? Try our quiz and find out!

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Regulator Demands Answers Over Tesla FSD Social Media Posts

US regulator says Tesla's messaging on social media could lead drivers to believe 'Full Self-Driving'…

3 hours ago

US Takes Chip Equipment Makers To Task Over China Sales

US lawmakers write to biggest chip equpment makers in US, Japan, Netherlands asking for data…

3 hours ago

Nvidia Market Value Surges Above $3.6tn

Investor optimism following Donald Trump re-election win pushes Nvidia to record high, adds 30 percent…

4 hours ago

ASML IT Outage Disrupts Worldwide Operations

Dutch chip equipment maker ASML says 'fully recovered' from IT outage affecting operations worldwide and…

4 hours ago

Judge Dismisses Personal Claims Against Meta’s Zuckerberg

US federal judge finds Meta chief excutive Zuckerberg can't be held personally liable in child-addiction…

5 hours ago

China’s SMIC Benefits From AI Chip Boom In Spite Of Sanctions

Chinese chip manufacturing giant SMIC says AI has helped boost revenues to record levels in…

5 hours ago