<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0"><channel><description>The Paranoid</description><title>Yahoo Security</title><generator>Tumblr (3.0; @yahoo-security)</generator><link>https://yahoo-security.tumblr.com/</link><item><title>Risk and Reward in Yahoo’s Bug Bounty Program</title><description>&lt;p&gt;&lt;i&gt;By Andrew Rios, Security Engineer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;“Don’t let the fox guard the henhouse,” the old adage goes. But for &lt;a href="https://hackerone.com/yahoo"&gt;our bug bounty program&lt;/a&gt;, we’ve flipped this conventional wisdom on its head to yield some strong results for the security of our online properties. &lt;/p&gt;&lt;p&gt;Since its inception three years ago, our bug bounty program has increasingly helped to harden the security of our products. Over this short period, we’ve received thousands of submissions, and, as of December 2016, the bounties awarded for reports that resulted in real bug fixes has now surpassed a total of $2 million. Just last month, &lt;a href="https://threatpost.com/flickr-vulnerability-worth-7k-bounty-to-researcher/125312/"&gt;a security researcher helped us&lt;/a&gt; identify and patch a vulnerability in Flickr. &lt;/p&gt;&lt;p&gt;In 2016 alone, we awarded nearly 200 researchers around the world. These bounties helped to fix vulnerabilities of varying severity across our web properties. Most bounties accounted for less impactful vulnerabilities, but some were more substantial.&lt;/p&gt;&lt;p&gt;Yes, this all comes with a degree of vulnerability. After all, we’re asking some of the world’s best hackers to seek out soft spots in our defenses. But it’s acceptable risk. The right incentives combined with some hackers who actually want to do some good has resulted in a diverse and growing global community of contributors to our security. Currently, our bug bounty program sees more than 2,000 contributors from more than 80 countries.&lt;/p&gt;&lt;figure class="tmblr-full" data-orig-height="243" data-orig-width="680"&gt;&lt;img src="https://78.media.tumblr.com/2e28f5f841d3a512ef68435f5c594f3c/tumblr_inline_opmvgwo8RH1qhxx5s_540.png" data-orig-height="243" data-orig-width="680"/&gt;&lt;/figure&gt;&lt;p&gt;&lt;i&gt;Visual representation of the locations of researchers who have contributed to Yahoo’s bug bounty program.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;In 2017, we’ll look to continue to foster this healthy marriage in security. Attracting the highest skilled hackers to our program with meaningful bounties will continue to result in impactful bug reporting.&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/160442546105</link><guid>https://yahoo-security.tumblr.com/post/160442546105</guid><pubDate>Mon, 08 May 2017 09:56:49 -0400</pubDate><category>bugbounty</category><category>yahoo</category><category>security</category></item><item><title>Important Security Information for Yahoo Users</title><description>&lt;p&gt;&lt;a href="https://yahoo.tumblr.com/post/154479236569/important-security-information-for-yahoo-users" class="tumblr_blog"&gt;yahoo&lt;/a&gt;:&lt;/p&gt;&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Bob Lord, CISO&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;Following a recent investigation, we’ve identified data security issues concerning certain Yahoo user accounts. We’ve taken steps to secure those user accounts and we’re working closely with law enforcement.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What happened?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;As we previously disclosed in November, law enforcement provided us with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016.&lt;/p&gt;
&lt;p&gt;For potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers. The investigation indicates that the stolen information did not include passwords in clear text, payment card data, or bank account information. Payment card data and bank account information are not stored in the system the company believes was affected.&lt;/p&gt;
&lt;p&gt;Separately, we previously disclosed that our outside forensic experts were investigating the creation of forged cookies that could allow an intruder to access users’ accounts without a password. Based on the ongoing investigation, we believe an unauthorized third party accessed our proprietary code to learn how to forge cookies. The outside forensic experts have identified user accounts for which they believe forged cookies were taken or used. We are notifying the affected account holders, and have invalidated the forged cookies. We have connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What are we doing to protect our users?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;We are notifying potentially affected users and have taken steps to secure their accounts, including requiring users to change their passwords. We have also invalidated unencrypted security questions and answers so that they cannot be used to access an account. With respect to the cookie forging activity, we invalidated the forged cookies and hardened our systems to secure them against similar attacks. We continuously enhance our safeguards and systems that detect and prevent unauthorized access to user accounts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;What can users do to protect their account?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;We encourage our users to visit our&lt;a href="https://safety.yahoo.com/"&gt; Safety Center page&lt;/a&gt; for recommendations on how to stay secure online. Some important recommendations we’re re-emphasizing today include the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Change your passwords and security questions and answers for any other accounts on which you used the same or similar information used for your Yahoo account;&lt;/li&gt;
&lt;li&gt;Review all of your accounts for suspicious activity;&lt;/li&gt;
&lt;li&gt;Be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information;&lt;/li&gt;
&lt;li&gt;Avoid clicking on links or downloading attachments from suspicious emails; and&lt;/li&gt;
&lt;li&gt;Consider using&lt;a href="https://help.yahoo.com/kb/SLN25781.html;_ylt=A0LEVxtfJU5Y63EALp1XNyoA;_ylu=X3oDMTEyZmJjbHVnBGNvbG8DYmYxBHBvcwMxBHZ0aWQDQjI4MjNfMQRzZWMDc3I-"&gt; Yahoo Account Key&lt;/a&gt;, a simple authentication tool that eliminates the need to use a password on Yahoo altogether.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;For more information about these security matters and our security resources, please visit the Yahoo Security Issue FAQs page,&lt;a href="https://yahoo.com/security-update"&gt; https://yahoo.com/security-update.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Statements in this press release regarding the findings of Yahoo’s ongoing investigations involve potential risks and uncertainties. The final conclusions of the investigations may differ from the findings to date due to various factors including, but not limited to, the discovery of new or additional information and other developments that may arise during the course of the investigation. More information about potential risks and uncertainties of security breaches that could affect the Company’s business and financial results is included under the caption “Risk Factors” in the Company’s Quarterly Report on Form 10-Q for the quarter ended September 30, 2016, which is on file with the SEC and available on the SEC’s website at&lt;a href="http://www.sec.gov/"&gt; &lt;/a&gt;&lt;a href="about:blank"&gt;www.sec.gov.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/154479347085</link><guid>https://yahoo-security.tumblr.com/post/154479347085</guid><pubDate>Wed, 14 Dec 2016 16:56:11 -0500</pubDate></item><item><title>Yahoo Trains Law Enforcement on Digital Citizenship and Online Safety</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://yahoopolicy.tumblr.com/post/153312163833"&gt;yahoopolicy&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Kathleen Lefstad, Policy Manager, Trust &amp;amp; Safety&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;Yahoo’s “train the trainer” Digital Online Safety Course was shared with law enforcement in Quincy, Washington this past week, with school resource officers from Grant County, Warden, Ephrata, Yakima, Moses Lake and Quincy in attendance. With more than 1,000 officers trained to date, Yahoo was proud to bring this course to Quincy, providing the resources and tools to help officers facilitate discussions about online safety and good digital citizenship with their communities.&lt;/p&gt;
&lt;figure data-orig-width="2620" data-orig-height="1132" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/1e7641c33517c727aa9b379e9f7456e3/tumblr_inline_ogswznY6mr1qhxx5s_540.jpg" alt="image" data-orig-width="2620" data-orig-height="1132"/&gt;&lt;/figure&gt;&lt;p&gt;Police Chief Bob Heimbach was grateful for Yahoo’s commitment to bring the course to Washington saying, “With the world interconnected in this electronic age, this safety training, and providing us the ability to support our community members in digital safety, is invaluable. Yahoo has demonstrated their intent and commitment to being a good partner and community member here in Quincy.”&lt;/p&gt;
&lt;figure class="tmblr-full" data-orig-height="4032" data-orig-width="3024"&gt;&lt;img src="https://78.media.tumblr.com/b432994138e19d358db3a511c84dc6cf/tumblr_inline_ogt22k9f1v1qhxx5s_540.jpg" data-orig-height="4032" data-orig-width="3024"/&gt;&lt;/figure&gt;&lt;p&gt;It was nearly eight years ago that the course was first created, when Officer Holly Lawrence approached Yahoo to create presentations for School Resource Officers to give about safety and citizenship in a digital world. The training has been successful due to it’s focus on education of the material, sharing of available resources and, specifically, how to present the material effectively for different audiences.&lt;/p&gt;
&lt;figure data-orig-width="2136" data-orig-height="1987" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/088c22220f0b2a7f58139660b8192732/tumblr_inline_ogsx0ysPM51qhxx5s_540.jpg" alt="image" data-orig-width="2136" data-orig-height="1987"/&gt;&lt;/figure&gt;&lt;p&gt;With an emphasis on communication, these presentations open the door to talk about online trends and safety issues, and identify workable solutions and preparedness together. “The old adage about ‘it takes a village’ is still true, but maybe we should start saying ‘it takes an ivillage,’” said Officer Holly Lawrence, Ret., a law enforcement partner of Yahoo, who helps run these courses nationwide. “As more communities develop and thrive in the digital space, kids and their trusted adults need the tools to be able to speak one-to-one (if not face-to-face) about the challenges and opportunities of life online.”&lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/153315349705</link><guid>https://yahoo-security.tumblr.com/post/153315349705</guid><pubDate>Thu, 17 Nov 2016 16:26:36 -0500</pubDate></item><item><title>Managing Your Yahoo Account Access is Easier than Ever</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://yahoo.tumblr.com/post/151708172989"&gt;yahoo&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Dylan Casey, Vice President of Product Management&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;We’re making it easier than ever to see and manage all of the devices connected to your Yahoo account. Today, you might notice some new improvements to help you keep track of the account activity and devices associated with your Yahoo account. This information is available to all users under “Account Info” here: &lt;a href="https://login.yahoo.com/account/activity"&gt;https://login.yahoo.com/account/activity&lt;/a&gt;. Before we get too technical, let’s explain how this works in a real-world scenario.&lt;/p&gt;
&lt;figure class="tmblr-full" data-orig-height="702" data-orig-width="1250"&gt;&lt;img src="https://78.media.tumblr.com/2d935e51769d2ac443d552e71cbdad07/tumblr_inline_oexz70aaZI1qhxx5s_540.png" data-orig-height="702" data-orig-width="1250"/&gt;&lt;/figure&gt;&lt;p&gt;Imagine that your phone falls out of your pocket in a taxi and later that day you realize that you’ve lost it. From a computer, tablet or alternate device, just sign in to your Yahoo account and head over to “Account Info.” There you’ll find a tab that says “Recent Activity.” Find the apps on your phone that are shown to have access to your account and remove them. This will invalidate the &lt;a href="https://en.wikipedia.org/wiki/Oauth"&gt;OAuth token&lt;/a&gt; so that no one else can use those apps to access your account on your lost phone. The same can be done for any other devices you might own that are authorized to use your Yahoo account, including a laptop, desktop computer, tablet or cell phone.&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;Users already had the ability to invalidate OAuth tokens through the Member Center, but this feature makes it easier to see and control which devices and apps are validated to access their Yahoo account, offering greater convenience and peace of mind.&lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/151708884580</link><guid>https://yahoo-security.tumblr.com/post/151708884580</guid><pubDate>Wed, 12 Oct 2016 12:20:42 -0400</pubDate></item><item><title>An Important Message About Yahoo User Security</title><description>&lt;p&gt;&lt;i&gt;By Bob Lord, CISO&lt;/i&gt;&lt;/p&gt;&lt;p&gt;We have confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 in what we believe is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo’s network. Yahoo is working closely with law enforcement on this matter.&lt;/p&gt;&lt;p&gt;We are taking action to protect our users:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;We are notifying potentially affected users. The content of the email Yahoo is sending to those users will be available at  &lt;a href="https://yahoo.com/security-notice-content"&gt;https://yahoo.com/security-notice-content&lt;/a&gt; beginning at 11:30 am (PDT).&lt;br/&gt;&lt;/li&gt;&lt;li&gt;We are asking potentially affected users to promptly change their passwords and adopt alternate means of account verification.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;We invalidated unencrypted security questions and answers so they cannot be used to access an account.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;We are recommending that all users who haven’t changed their passwords since 2014 do so.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;We continue to enhance our systems that detect and prevent unauthorized access to user accounts.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;We are working closely with law enforcement on this matter.&lt;br/&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;We encourage our users to follow these &lt;a href="https://safety.yahoo.com/Security/?soc_src=mail&amp;amp;soc_trk=ma"&gt;security recommendations&lt;/a&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Change your password and security questions and answers for any other accounts on which you used the same or similar information used for your Yahoo account.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Review your accounts for suspicious activity. &lt;br/&gt;&lt;/li&gt;&lt;li&gt;Be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Avoid clicking on links or downloading attachments from suspicious emails.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Additionally, please consider using &lt;a href="https://help.yahoo.com/kb/SLN25781.html?soc_src=mail&amp;amp;soc_trk=ma"&gt;Yahoo Account Key&lt;/a&gt;, a simple authentication tool that eliminates the need to use a password altogether.&lt;/p&gt;&lt;p&gt;An increasingly connected world has come with increasingly sophisticated threats. Industry, government and users are constantly in the crosshairs of adversaries. Through strategic proactive detection initiatives and active response to unauthorized access of accounts, Yahoo will continue to strive to stay ahead of these ever-evolving online threats and to keep our users and our platforms secure.&lt;/p&gt;&lt;p&gt;For more information about this issue and our security resources, please visit the Yahoo Security Issue FAQs page, &lt;a href="https://help.yahoo.com/kb/account/SLN27925.html?impressions=true"&gt;https://yahoo.com/security-update&lt;/a&gt;, which will be up beginning at 12pm (PDT).&lt;/p&gt;&lt;p&gt;Statements in this press release regarding the findings of Yahoo’s ongoing investigation involve potential risks and uncertainties.  The final conclusions of the investigation may differ from the findings to date due to various factors including, but not limited to, the discovery of new or additional information and other developments that may arise during the course of the investigation.  More information about potential risks and uncertainties of security breaches that could affect the Company’s business and financial results is included under the caption “Risk Factors” in the Company’s Quarterly Report on Form 10-Q for the quarter ended June 30, 2016, which is on file with the SEC and available on the SEC’s website at &lt;a href="http://www.sec.gov./"&gt;http://www.sec.gov./&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://investor.yahoo.net/releasedetail.cfm?ReleaseID=990570"&gt;https://investor.yahoo.net/releasedetail.cfm?ReleaseID=990570&lt;/a&gt;&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/150782028915</link><guid>https://yahoo-security.tumblr.com/post/150782028915</guid><pubDate>Thu, 22 Sep 2016 14:32:31 -0400</pubDate></item><item><title>Security and Product Design with Human Rights in Mind</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://yahoobhrp.tumblr.com/post/148985458174"&gt;yahoobhrp&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Katie Shay, Legal Counsel, Business &amp;amp; Human Rights&lt;/i&gt;&lt;/p&gt;
&lt;figure class="tmblr-full" data-orig-height="1000" data-orig-width="2000"&gt;&lt;img src="https://78.media.tumblr.com/04e45832c6dc931ac74c89aed9e087f1/tumblr_inline_obyanxbKNm1sye0cn_540.jpg" data-orig-height="1000" data-orig-width="2000"/&gt;&lt;/figure&gt;&lt;p&gt;Twelve security trainers, tool developers and human rights activists from four continents came to our headquarters in Sunnyvale, California. Their mission? To share their unique perspectives with our Yahoo products, engineering, security, public policy and legal teams. &lt;a href="https://yahoobhrp.tumblr.com/"&gt;Yahoo’s Business &amp;amp; Human Rights Program&lt;/a&gt;, the Paranoids and Yahoo for Good orchestrated this ‘hack of the minds’ in partnership with &lt;a href="https://internews.org/"&gt;Internews&lt;/a&gt; and the &lt;a href="https://usable.tools/"&gt;USABLE&lt;/a&gt; Project.&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;USABLE Project’s aim is to inform the development of security tools that are easy to use and simple to understand for users from diverse backgrounds and skill levels. Their goal is to support vulnerable populations around the world who use the internet for more than just sharing pictures of cats or Venmoing a friend for lunch. In many cases, these users rely on the internet to exercise their right to free expression, expose corruption or fight against injustice in their communities. For these users, the ability to be secure online is critical.  &lt;/p&gt;
&lt;p&gt;In July, Yahoo was proud to sponsor the USABLE Project’s first ever public forum, &lt;a href="https://usable.tools/uxforum.html"&gt;UX in a High Risk World&lt;/a&gt; in San Francisco, bringing together frontline digital security practitioners, users, tool developers and UX experts from around the world. In addition, Yahoo participated in the final day of USABLE’s four-day closed-door workshop leading up to this event, working directly with this community to build concrete, actionable roadmaps to improve usability in security tools.&lt;/p&gt;
&lt;p&gt;Following the forum, the delegation from USABLE that visited Yahoo shared their on-the-ground perspective on why remaining secure online is so important to their work. They explained how they use Yahoo products, including Flickr and Mail, why it’s important to have a &lt;a href="https://transparency.yahoo.com/principles"&gt;principled approach to responding to government requests for user data and content moderation&lt;/a&gt;, as well as the importance of baking in security features to products from the outset by turning them on by default. These visionary leaders are working toward solutions for activists facing censorship, hacking, surveillance and suppression in some of the world’s most challenging environments. &lt;/p&gt;
&lt;p&gt;During the delegation’s visit, our Yahoo teams asked pointed questions to understand the experience of some of our most vulnerable users and to explore how their experiences might inform Yahoo’s product development and online security work. &lt;/p&gt;
&lt;p&gt;We are grateful to the USABLE team for sharing their stories with us, and for inspiring our teams to continue to find new and innovative ways to put our &lt;a href="https://transparency.yahoo.com/users-first"&gt;users first&lt;/a&gt;!  &lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/148988976335</link><guid>https://yahoo-security.tumblr.com/post/148988976335</guid><pubDate>Mon, 15 Aug 2016 13:36:45 -0400</pubDate><category>usersfirst yahoo privacy</category></item><item><title>What’s in a ‘Red Team’ and Why Aren’t Companies Deploying Them?</title><description>&lt;p&gt;&lt;i&gt;By Bob Lord, Yahoo Paranoid in Chief &lt;a href="https://twitter.com/boblord"&gt;(@boblord)&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.buzzfeed.com/williamalden/how-hired-hackers-got-complete-control-of-palantir?utm_term=.ifYy5vedW#.opqQGO9EN"&gt;Recent headlines&lt;/a&gt; might lead you to believe that when a company runs a red team exercise that the red team should fail. After all, the company has invested in security teams, products and processes. So the outcome should be a win for the blue team and a failure for the red team. (For those of you who are lost already, a red team is an independent group within a company’s security organization that challenges the effectiveness of its security defenses. The red team performs analysis of systems and process gaps. Then it attacks you, hopefully before a real adversary does.) Let’s set the record straight on this critical aspect of modern security programs.&lt;/p&gt;&lt;p&gt;&lt;b&gt;The red team always wins. Always. &lt;/b&gt;&lt;/p&gt;&lt;p&gt;It can be humiliating. And the timing is rarely convenient. Friday late night or on Christmas morning? Fair game.&lt;/p&gt;&lt;p&gt;The red team adopts the tools and techniques of actual adversaries. They use their understanding of attacks on other organizations that have been made public. They mimic the work of adversaries that the blue team has caught. They do not fight fair, nor will your adversaries. &lt;/p&gt;&lt;p&gt;Most companies prepare their defenses around best practices and compliance. Those alone will not get you very far. Even the organizations that use threat models and attack chains (i.e. the common events in an attack) need to practice. Practice. Measure. Learn. Repeat.&lt;/p&gt;&lt;p&gt;Most companies think they have a security plan. One of the great philosophers of our time, Mike Tyson, once remarked “Everybody has a plan until they get punched in the mouth.” Will your muscle memory kick in after getting hit? Or will you be stunned? Companies that engage in continuous red/blue battles are far more likely to detect and survive real attacks.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Having a security program without a red team is like practicing martial arts in the mirror rather than with a worthy sparring partner.&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A red team exercise should not be an annual activity. It should represent a continuous clear and present danger. An employee, for example, may (incorrectly) doubt that they are the target of state-sponsored actors. They might think “Why should I close these minor gaps? It’s not like anyone would use these vulnerabilities against us!” They can, however, be sure that their red team is actively targeting them. Continuous red team exercises, over time, will give the blue team a fighting chance.&lt;/p&gt;&lt;p&gt;After the red team attack, what do you do? Do you “fix the glitch”? Or do you take time in the post-mortem to find the root cause and to fix it? More mature organizations will revisit the gaps over time. They provide input into the next planning cycle. Lessons learned from red team exercises contribute to a stronger defense and a better chance of stopping the real adversaries.  &lt;/p&gt;&lt;p&gt;The real scandal is not that a red team won (the red team always wins!), but that many companies do not have red teams. Reporters: want a great story? Ask every CISO you talk to if they have a full-time, dedicated red team. Prepare yourself to hear some spin.&lt;/p&gt;&lt;p&gt;Unacceptable answers: &lt;/p&gt;&lt;ul&gt;&lt;li&gt;We are not the target of sophisticated adversaries.&lt;/li&gt;&lt;li&gt;We already know we have a lot of work to do so adding a red team report isn’t going to help.&lt;/li&gt;&lt;li&gt;We work in a highly regulated industry so it’s not necessary.&lt;/li&gt;&lt;li&gt;We have not had a breach in years.&lt;/li&gt;&lt;li&gt;Our attack surface is small.&lt;/li&gt;&lt;li&gt;Our IT team is great and we do a good job of user training.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Yahoo has its own internal red team known as Offensive Engineering (yes, that can be read two ways!). Their job is to take a contrarian view of Yahoo systems. They don’t care what the code was designed to do. They care about what it actually does. And yes, this red team always wins. Always. It’s what we pay them to do. &lt;/p&gt;&lt;p&gt;Let’s stop talking about red team wins as if they are a bad thing and let’s start talking about the red vs blue feedback loop: Practice. Measure. Learn. Repeat.&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/146318766495</link><guid>https://yahoo-security.tumblr.com/post/146318766495</guid><pubDate>Wed, 22 Jun 2016 15:29:55 -0400</pubDate><category>yahoo</category><category>users first</category><category>security</category></item><item><title>Not All Bugs Are Created Equal</title><description>&lt;p&gt;&lt;i&gt;Doug DePerry, Senior Security Engineer, Paranoids&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;In our inaugural post to &lt;i&gt;The Paranoid&lt;/i&gt;, we discussed the human element behind online attacks–&lt;a href="https://yahoo-security.tumblr.com/post/145318321075/life-as-a-paranoid-understanding-the-human"&gt;the human adversary&lt;/a&gt;. We sought to give some perspectives as to who is behind online threats in order to better understand how to defend against them. Yahoo’s bug bounty program applies that insight in our ongoing efforts to provide a safe environment for our users. By thinking about the economics of security, we’ve found that we can tilt the advantage in our favor by partnering with industry-leading security researchers.&lt;/p&gt;&lt;p&gt;We often get questions from both security researchers, and people just interested in learning about how programs like these work. We thought we’d use this opportunity to take a quick look under the hood.&lt;/p&gt;&lt;p&gt;First, some background. Bug bounty programs essentially crowd-source security. They allow companies to improve coverage so they are able to add additional eyes where they need them. Bug bounty researchers also bring depth of expertise and different skill sets that can uncover hard to find bugs.  &lt;/p&gt;&lt;p&gt;For the past two years, Yahoo has developed one of the largest and most successful bug bounty programs in the industry. We’ve paid out over $1.7 million dollars in bounties, resolved more than 2,000 security bugs and maintain a “hackership” of more than 2,000 researchers, some of whom make careers out of it. &lt;/p&gt;&lt;p&gt;Security researchers often ask us how we decide the payout associated with a given bug report. At first it might seem logical that we pay based on the type or classification of a security bug. Some bug types tend to be bad, so you might think that they would be paid the same. However, in the vast majority of cases, that’s not the complete story. So if the bug type alone is not what we use to determine the payout, what is? The missing input to the calculation is the impact of the vulnerability. We take into account what data might have been exposed, the sensitivity of that data, the role that data plays, network location and the permissions of the server involved. Those factors are of great importance.&lt;/p&gt;&lt;p&gt;Given the importance of the impact of a bug, the Yahoo bug bounty program does not reward researchers solely based on bug type. The type of bug a security researcher finds is mostly irrelevant. It’s what the bug allows them to do and where that are most important. What can an attacker actually do with this specific bug to potentially affect the security of Yahoo or our users? Furthermore, Yahoo’s application landscape is not necessarily uniform; certain properties or applications are more equal than others.&lt;/p&gt;&lt;p&gt;Here’s an example to show how these factors work in practice. SQL injection bugs are often a devastating bug class because they can provide full access to a database. Odds are, if a company has a presence on the web, they are storing sensitive information in databases. But just because an attacker can access the database does not mean it’s game over. The real reason that the SQL injection bug class can be so devastating is the data stored in the database may be accessed or changed by unauthorized parties. The typical impact of a SQL injection bug is high because the data exposed is typically sensitive, except when it’s not. What if the database doesn’t contain any sensitive data? &lt;/p&gt;&lt;p&gt;Part of the process in determining impact can seem opaque to the researcher, and we understand that. That obscurity is an unfortunate but necessary fact of life in a bug bounty program. As an external party, it is just not possible to have all the information. The sort of testing available to participants in a public bug bounty program is inherently “black box”–no documentation, no source code, what you see is what you get.&lt;/p&gt;&lt;p&gt;So we encourage bug reporters to include in their reports what they believe the impact of the vulnerability to be (example report&lt;a href="https://hackerone.com/yahoo"&gt; here&lt;/a&gt;). Submitting a report that contains a thorough and detailed explanation of a legitimate security issue is much more highly valued and rewarded.&lt;/p&gt;&lt;p&gt;We also work closely with the developers to ensure the bug is fixed in a timely manner, and to obtain their expert opinion on impact if necessary. If the developers that created the application tell us that no sensitive data is stored in a particular database, we take that into consideration when awarding your bug. More detailed guidelines for our bug bounty program are available at hackerone.com/yahoo.&lt;/p&gt;&lt;p&gt;To paraphrase a little-known quote, “bug bounty programs don’t reward you for being clever.” Users and researchers should know that we place far more weight on how impactful bugs are to our platforms.&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/146014375610</link><guid>https://yahoo-security.tumblr.com/post/146014375610</guid><pubDate>Thu, 16 Jun 2016 11:25:54 -0400</pubDate><category>users first</category><category>yahoo</category><category>security</category><category>bug bounty</category></item><item><title>Life as a Paranoid: Understanding the Human Adversary</title><description>&lt;p&gt;&lt;i&gt;By Bob Lord, Yahoo CISO (Paranoid in Chief)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If the countless data breaches we read about in the news have confirmed anything, it’s that online security is somewhat of a moving target. We’ve witnessed compromised security at one point or another across every industry and government. From health records and email to financial information, intellectual property and critical infrastructure, it would seem nothing is secure these days. &lt;/p&gt;&lt;p&gt;Yet, despite being armed with this fundamental understanding of online security, it’s often treated as a static challenge&amp;ndash;as if there is one solution for one vulnerability. In an inherently insecure world with ever changing threats, our conventional wisdom must evolve just as online threats do. &lt;/p&gt;&lt;p&gt;The obvious next question is how, and that’s a good question to ask with a plethora of answers. But in order to understand how we adapt to emerging threats, it’s first and foremost critical to understand the dynamics behind the threats themselves. Why are the threats changing and what allows them to continue to be successful? &lt;/p&gt;&lt;p&gt;In fact, the next best question to ask is who is behind today’s online threats. The most important aspect of online security that we can internalize is that we are up against dedicated, human adversaries who organize their activities into campaigns. &lt;/p&gt;&lt;p&gt;They are dedicated, which means they have a job to do, or a calling. They’re going to keep coming back until they achieve their goals. Maybe they work for a criminal syndicate, or for a foreign military. Or maybe they are on a mission from God. &lt;/p&gt;&lt;p&gt;They are also human, which means they can be creative and resourceful. They are like water in a cracked vase. It will find a way to seep out. They spend time learning your internal processes and reading your internal documentation before acting.&lt;/p&gt;&lt;p&gt;And finally, they work in campaigns. The data they seek from a system may not be valuable by itself. It may be that the data is valuable because it provides information about human rights activists in their own country. Or because they want to know what their political opponents are doing. They are likely targeting other services of peers and competitors. The data they collect is only valuable to the extent the campaign objectives are known. &lt;/p&gt;&lt;p&gt;Our activities as defenders, whether the casual user to the chief information security officer, need to line up against these characteristics of our adversaries. Are we considering how a phone call from an unfamiliar number but a familiar voice might be part of a social engineering scheme? Are we employing security tactics that eliminate an attack instead of letting it shift to a new vector? &lt;/p&gt;&lt;p&gt;Until we start thinking about online adversaries this way, we’ll continue to find ourselves playing whack-a-mole without ever turning the tide. &lt;/p&gt;&lt;p&gt;This is the first edition of our new Yahoo Tumblr series&amp;ndash;The Paranoid&amp;ndash;where we will delve into the security space and share how we’re working to protect our users, as well as useful tips for users to consider as they go about their everyday lives online. Like all good security researchers, we will look at security issues from the viewpoint of an adversary. Our goals with this series are to break conventional wisdom, ask tough questions about how we approach online security, and ultimately allow our users to hold us to a higher standard. Most importantly, we want to start a conversation to ultimately improve the safety and security of our users and our network. &lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/145318321075</link><guid>https://yahoo-security.tumblr.com/post/145318321075</guid><pubDate>Thu, 02 Jun 2016 15:35:09 -0400</pubDate><category>users first</category><category>security</category><category>public policy</category><category>theparanoid</category></item><item><title>HackerOne: Yahoo Bug Bounty Case Study</title><description>&lt;p&gt;By Doug DePerry, Senior Paranoid&lt;br/&gt;&lt;/p&gt;&lt;p&gt;We
 put our users’ security first at Yahoo, and today we’re proud to 
highlight one way in which we’re protecting our users against evolving 
online threats through our bug bounty program. Partnering with &lt;a href="https://hackerone.com/resources?utm_source=y&amp;amp;utm_medium=t"&gt;HackerOne&lt;/a&gt;,
 Yahoo’s bug bounty program has grown dramatically since our launch 
about two years ago. Our bug bounty program boasts more than 2,000 
security researchers and we’ve awarded $1.6 million in the last two 
years. Our security team, known as the Paranoids, work night and day to 
secure our users, but, with an online property as large as Yahoo, having
 as many eyes as possible focused on the security of our users 
crowd-sources what would otherwise be an impossible task for the 
resources of a few.&lt;/p&gt;&lt;p&gt;Learn more about our growing bug bounty program &lt;a href="https://hackerone.com/resources?utm_source=y&amp;amp;utm_medium=t"&gt;here&lt;/a&gt;. &lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/144512009105</link><guid>https://yahoo-security.tumblr.com/post/144512009105</guid><pubDate>Tue, 17 May 2016 14:05:05 -0400</pubDate><category>users first</category><category>security</category><category>bug bounty</category></item><item><title>staff:

We recently learned that a third party had obtained access to a set of Tumblr user email...</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://staff.tumblr.com/post/144263069415"&gt;staff&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We recently learned that a third party had obtained access to a set of Tumblr user email addresses with salted and hashed passwords from early 2013, prior to the acquisition of Tumblr by Yahoo. As soon as we became aware of this, our security team thoroughly investigated the matter. Our analysis gives us no reason to believe that this information was used to access Tumblr accounts. As a precaution, however, we will be requiring affected Tumblr users to set a new password.&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;For additional information on keeping your accounts secure, please visit our &lt;a href="https://www.tumblr.com/docs/en/account_security#protection"&gt;Account Security&lt;/a&gt; page.&lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/144263220905</link><guid>https://yahoo-security.tumblr.com/post/144263220905</guid><pubDate>Thu, 12 May 2016 16:36:10 -0400</pubDate></item><item><title>2nd Bay Area Crypto Day</title><description>&lt;figure data-orig-width="261" data-orig-height="291"&gt;&lt;img src="https://78.media.tumblr.com/006af1c650b5767e4b75966e5c706db3/tumblr_inline_o6b53rKuHr1qhxx5s_540.png" data-orig-width="261" data-orig-height="291"/&gt;&lt;/figure&gt;&lt;p&gt;&lt;i&gt;&lt;b&gt;Monday May 2, at Stanford University&lt;/b&gt;&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Recent years have witnessed exciting progress in the development of cryptographic techniques enabling new functionalities and ways of interaction, such as fully homomorphic encryption, program obfuscation, and verifiable outsourcing of computation. The second Bay Area Crypto Day workshop, for Bay Area researchers to present and discuss the latest developments in the theory of crypto, will take place at Stanford University on Monday, May 2. The workshop’s program and other relevant information can be found &lt;a href="https://sites.google.com/site/bayareacryptoday"&gt;here&lt;/a&gt;. Yahoo Research is proud to co-organized the event along with Stanford University and UC Berkeley.&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/143493762525</link><guid>https://yahoo-security.tumblr.com/post/143493762525</guid><pubDate>Wed, 27 Apr 2016 15:36:29 -0400</pubDate></item><item><title>Measuring SMTP STARTTLS Deployment Quality</title><description>&lt;p&gt;&lt;i&gt;By Binu Ramakrishnan, Security Engineer, Yahoo Mail&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;Summary&lt;/h2&gt;&lt;p&gt;At Yahoo, our users send and receive billions of emails everyday. We work to make Yahoo Mail easy to use, personalized, and secure for our hundreds of millions of users around the world. In line with our efforts to protect our users’ data, our security team recently conducted a study to measure the deployment quality of SMTP STARTTLS deployments. We found that while the use of STARTTLS is common and widespread, the growth has slowed in recent years. Providers with good/valid certificates have better TLS settings compared to others, and we believe there is an important need to improve the quality of STARTTLS deployments to protect messages &amp;ndash; and therefore, users &amp;ndash; from active network attacks.&lt;/p&gt;&lt;h2&gt;The Modern Mail Ecosystem&lt;/h2&gt;&lt;p&gt;Simple Mail Transfer Protocol (SMTP) is the underlying protocol used for email transmission, especially when sending or receiving email between different providers. The SMTP protocol does not require encryption by default, and mail providers like Yahoo depend on the STARTTLS extension to encrypt messages in transit. Unfortunately, not all providers support STARTTLS when they send or receive emails, potentially exposing them to network eavesdropping.&lt;/p&gt;&lt;p&gt;The diagram below offers a simplified view of a modern mail ecosystem. Communication between service providers are over the SMTP protocol, and the providers use MTAs to send and receive messages to/from other providers. MTAs speak the SMTP protocol and use STARTTLS to encrypt the messages in transit. To send a message, the sender (MTA outbound) resolves a mail exchanger record (MX) for the recipient’s domain from DNS. The MX record contains the recipient’s (MTA inbound) server name. Once the recipient’s server name is resolved, the sender connects to that server and transmits messages.&lt;/p&gt;&lt;figure data-orig-width="938" data-orig-height="608" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/9d3918a9870fc97030c72ed326b0d1e6/tumblr_inline_o4ev94QRkP1sbr0wj_540.jpg" alt="image" data-orig-width="938" data-orig-height="608"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 1: A high level overview of a mail ecosystem&lt;/center&gt;&lt;br/&gt;&lt;p&gt;STARTTLS has received a lot of attention in recent years. Around half a dozen studies were published and presented in 2015 (see Appendix), all of which underscore the importance of securing mail delivery infrastructure against mass surveillance and network eavesdropping. Since mail is an open system, a collective industry wide effort is critical to secure our email communication.&lt;/p&gt;&lt;p&gt;&lt;b&gt;What is STARTTLS ?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;STARTTLS is an extension that enables opportunistic upgrades of plaintext communication to encrypted communication between STARTTLS aware client and server. The diagram below shows an SMTP session between a client and a server. When the server desires to receive emails over TLS, it returns 250 STARTTLS back to client in response to EHLO from client. If the client supports TLS, it may initiate a TLS handshake and once the TLS session is established, messages will be sent over an encrypted channel.&lt;/p&gt;&lt;figure data-orig-width="1138" data-orig-height="662" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/8a688e6dd5314d366e904bdb7d0f8e59/tumblr_inline_o4ev9oLOoy1sbr0wj_540.jpg" alt="image" data-orig-width="1138" data-orig-height="662"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 2: SMTP STARTTLS session between a client and a server&lt;/center&gt;&lt;br/&gt;&lt;p&gt;STARTTLS provides protection against passive attacks and, in fact, the opportunistic nature of STARTTLS drove widespread adoption of TLS in SMTP. At the same time, ‘opportunistic’ encryption also means that STARTTLS is not effective against MITM (active) attacks because of: (1) &lt;b&gt;STARTTLS downgrade attacks&lt;/b&gt; - by stripping STARTTLS from an active SMTP session that forces messages to send over cleartext, and (2) the possibility of &lt;b&gt;DNS MX spoof attacks&lt;/b&gt; in which a compromised name server returns a spoofed MX target host or IP address and diverts the traffic through the attacker’s mail server.&lt;/p&gt;&lt;h2&gt;Methodology&lt;/h2&gt;&lt;p&gt;For this study, we collected 12M unique domains from a 30 day period in January 2016 of mail outbound logs. Of the 12M domains we scanned, we gathered stats for 9M domains with 3.7M unique MX hosts and ~1M unique IP addresses. The data collected is aggregated and presented in multiple buckets – unique Domain, MX, IP etc. This data is also compared with a previous study (&lt;a href="http://www.slideshare.net/BinuRamakrishnan/analysis-of-tls-in-smtp-world"&gt;slides&lt;/a&gt;) we did in May 2015 (presented at &lt;a href="https://www.m3aawg.org/"&gt;M3AAWG&lt;/a&gt; 34th General Meeting in Dublin, Ireland). We scanned the domains with a fast TLS scanner written in Go and used Unix tools to analyze the data.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Caveats&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The Go TLS implementation has limited cipher support: specifically, it does not support deprecated/insecure ciphers. It also does not have SSLv3 client side support. This study is based on domains we collected from Yahoo, and we considered only those domains with at least three or more emails sent during that period.&lt;/p&gt;&lt;h2&gt;Findings&lt;/h2&gt;&lt;p&gt;Our findings are grouped and presented in buckets based on:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Domains - Unique domains (9M)&lt;br/&gt;&lt;/li&gt;&lt;li&gt;MX - Unique MX hosts (3.7M)&lt;br/&gt;&lt;/li&gt;&lt;li&gt;IP - Unique IP addresses (1M)&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Valid Cert - Unique MX with valid CA signed certificate (1.8M)&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Strict validation - Valid cert with a matching host name (peer verify) (626K)&lt;br/&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Note that these 9M domains are hosted by 3.7M MX hosts which in turn map to 1M unique IP addresses. Many domains share the same MX and many MXs share the same IP.&lt;/p&gt;&lt;h2&gt;STARTTLS Adoption&lt;/h2&gt;&lt;p&gt;Around 80% of MXs we scanned support STARTTLS. When compared to a similar study we conducted last year, STARTTLS adoption rate was flat with no significant growth expected in the near future. Adoption rate in the case of the unique IP bucket is lower than the other two buckets.&lt;/p&gt;&lt;figure data-orig-width="645" data-orig-height="408" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/3aaade9d13189e81abfde1f9e437b0d8/tumblr_inline_o4eu6fz4ht1sbr0wj_540.jpg" alt="image" data-orig-width="645" data-orig-height="408"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 3: STARTTLS adoption  (&lt;i&gt;*data from 2015)&lt;/i&gt;&lt;/center&gt;                                                                                    &lt;h2&gt;TLS X.509 Certificates&lt;/h2&gt;&lt;p&gt;&lt;b&gt;Public Key Size&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Public key size is the length of the RSA (or ECDSA) key used by the server. An RSA key size less than 2048 bits is considered weak, but we found that around 14% of MXs are still using weak 1024 bit RSA public keys. Interestingly, key sizes in the last two buckets were found to be more compliant than other buckets, which is expected considering that those hosts have valid CA signed certificates. We also observed five valid ECDSA certificates.&lt;/p&gt;&lt;figure data-orig-width="741" data-orig-height="404" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/ecf890aee9051082e8c40eb0057fd56f/tumblr_inline_o4eu72hyzU1sbr0wj_540.jpg" alt="image" data-orig-width="741" data-orig-height="404"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 4: Public key size distribution chart&lt;/center&gt;&lt;p&gt;&lt;b&gt;Signature Algorithm&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Signature algorithm is the cryptographic hash algorithm used by certificate authorities to sign TLS certificates. SHA1 based certificates are deprecated and currently being phased out. We have observed a few RSA-SHA1 based certificates issued in 2015 but found no RSA-SHA1 certificates issued in 2016 (as of January 31, 2016). However, a significant number of these SHA1 certificates remain valid well beyond 2016, which is a concern. Almost all browser vendors (in the HTTPS world) decided to mark SHA1 signed certificates as ‘untrusted’ if they encounter them after January 1, 2017. When compared with data from 2015, we find a significant increase in SHA256-based certificates which is expected. You may also notice a small percentage of MD5 based certificates, especially in Domain, MX and IP buckets. Note that almost all are either expired or self-signed.&lt;/p&gt;&lt;figure data-orig-width="866" data-orig-height="486" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/781e8159f7b8dcdd06c7db60fb3ed86e/tumblr_inline_o4eu7cyvs11sbr0wj_540.jpg" alt="image" data-orig-width="866" data-orig-height="486"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 5: Signature algorithm distribution chart&lt;/center&gt;&lt;p&gt;&lt;b&gt;Certificate Validation&lt;/b&gt;&lt;/p&gt;&lt;p&gt;This chart presents the certificates distribution in three groups: (1) Untrusted, (2) ValidCert, and (3) StrictValidCert. The ValidCert group represents certificates that chain to a trusted root CA and the StrictValidCert is the grouping of valid certificates with peer verified. Note that peer verification is against the MX hostname, not to the email domain. The unique domain bucket has more valid and strict-valid certificates than the other two buckets with more than 50% certificates that are peer-verified. This was largely because the large mail service providers that host millions of third party domains mostly use valid certificates for STARTTLS. In the case of unique IP category, we find a large percentage of untrusted certificates.&lt;/p&gt;&lt;figure data-orig-width="587" data-orig-height="337" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/b15efaee759c77620eceb19c9a1c9c6f/tumblr_inline_o4eu7pjLMD1sbr0wj_540.jpg" alt="image" data-orig-width="587" data-orig-height="337"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 6: Certificate validation&lt;/center&gt;&lt;p&gt;&lt;b&gt;Certificate Validation - Error-type Distribution&lt;/b&gt;&lt;/p&gt;&lt;br/&gt;&lt;p&gt;This chart shows the distribution of certificate validation error types. Hostname mismatch (PeerVerifyFailed) is more prevalent than self-signed/expired certificates in the domain and MX buckets. This was largely because the large hosted email providers prefer to use CA signed certificates over self-signed certificates. Interestingly, even the large mail providers grapple with hostname mismatch. Self-signed and expired certificates are more prevalent within the IP bucket.&lt;/p&gt;&lt;figure data-orig-width="660" data-orig-height="399" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/eb30c4ce79b1be00df8a182f161b1acd/tumblr_inline_o4eu7zMtT51sbr0wj_540.jpg" alt="image" data-orig-width="660" data-orig-height="399"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 7: Certificate validation error-type distribution&lt;/center&gt;&lt;p&gt;&lt;b&gt;Certificate Chain Depth&lt;/b&gt;&lt;/p&gt;&lt;br/&gt;&lt;p&gt;Chain depth of zero mainly represents self-signed certificates (in red) and is more prevalent in the first three buckets. However, for valid and strict-certs buckets, the chain depth is either two or three, which is expected.&lt;/p&gt;&lt;figure data-orig-width="631" data-orig-height="359" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/57629421f8fb4a4def694f54175ee44e/tumblr_inline_o4eu8a8iWo1sbr0wj_540.jpg" alt="image" data-orig-width="631" data-orig-height="359"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 8: X509 certificate chain depth distribution&lt;/center&gt;&lt;h2&gt;TLS Session&lt;/h2&gt;&lt;p&gt;&lt;b&gt;TLS Protocol Version&lt;/b&gt;&lt;/p&gt;&lt;p&gt;TLS version 1.2 usage increased since last year. The usage is higher in verified and strict-certs buckets. TLS1.1 usage is not statistically significant.&lt;/p&gt;&lt;figure data-orig-width="684" data-orig-height="408" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/22bd06cac4ee6c03b8aad27ff604ecb6/tumblr_inline_o4eu8sjc771sbr0wj_540.jpg" alt="image" data-orig-width="684" data-orig-height="408"/&gt;&lt;/figure&gt;&lt;center&gt;Figure 9: TLS protocol version&lt;/center&gt;&lt;p&gt;&lt;b&gt;Negotiated Ciphers&lt;/b&gt;&lt;/p&gt;&lt;br/&gt;&lt;p&gt;The data presented in this chart may not be 100% accurate, as our scanner is written in Go and the Go TLS implementation has limited cipher support. In particular, the Go TLS implementation does not support deprecated/insecure ciphers and DHE cipher suites, nor does it have SSLv3 client side support.&lt;/p&gt;&lt;figure data-orig-width="902" data-orig-height="442" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/ca390b8672406920db36d7e472bc8396/tumblr_inline_o4eu9byR2D1sbr0wj_540.jpg" alt="image" data-orig-width="902" data-orig-height="442"/&gt;&lt;/figure&gt;&lt;p&gt;       &lt;b&gt;                 &lt;/b&gt;&lt;/p&gt;&lt;center&gt;Figure 10: TLS session cipher distribution&lt;/center&gt;&lt;br/&gt;&lt;h2&gt;Deployment Quality - Focus areas for email service providers&lt;/h2&gt;&lt;p&gt;Though STARTTLS protects against passive network eavesdropping, it is not effective against active MITM attacks in its current form. An &lt;a href="https://tools.ietf.org/html/draft-margolis-smtp-sts-00"&gt;industry-wide effort&lt;/a&gt; is underway to strengthen the mail delivery infrastructure and the end goal is to protect against active MITM attacks,  thereby upholding users’ privacy. Below are a few recommendations that can greatly improve STARTTLS deployment quality. While these steps alone cannot protect against active attacks, by implementing these changes, mail providers can meet the baseline requirements to fight against pervasive monitoring attacks and increase the difficulty of active attacks.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Server side&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Eliminate self-signed and expired certificates&lt;/b&gt;. There are a few certificate authorities that provide certificates free of cost, including &lt;a href="https://letsencrypt.org/"&gt;Let’s Encrypt&lt;/a&gt;. Let’s Encrypt is a new certificate authority that provides free TLS certificates with the ability to automate certificate refresh, which solves the cert expiration issue. DNS-based Authentication of Named Entities (DANE) is an alternate way to authenticate STARTTLS server entities without a certificate authority. DANE relies on Domain Name System Security Extensions (DNSSEC) for security, but the challenge is that DNSSEC is not widely deployed and its adoption rate remains low. DANE does not require certificates issued by certificate authorities.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Upgrade valid certificates to conform to strict validation (peer verify)&lt;/b&gt;. Operators must make sure their certificates are not only valid, but also match their hostname. We observed a large number of valid certificates with hostname mismatches, some of which were from large mail providers.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Replace SHA1 based certificates with SHA256 based certificates&lt;/b&gt;. The SHA1 cryptographic hash algorithm is considered weak and the industry recommendation is to transition from SHA1 signed certificates to SHA256 signed certificates as early as possible.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Leverage strong ciphers and TLS protocol versions&lt;/b&gt;&lt;br/&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Disable SSLv2 and SSLv3 protocol versions&lt;/li&gt;&lt;li&gt;Enable Perfect Forward Secrecy (PFS) algorithms (ECDHE, DHE (dhparam &amp;gt; 2048))&lt;/li&gt;&lt;li&gt;Track vulnerabilities and patch TLS library (e.g., OpenSSL) as applicable&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p&gt;Refer to Mozilla’s server side TLS &lt;a href="https://wiki.mozilla.org/Security/Server_Side_TLS"&gt;configuration&lt;/a&gt; and &lt;a href="https://cipherli.st/"&gt;https://cipherli.st/&lt;/a&gt; for  good TLS config examples&lt;/p&gt;&lt;p&gt;&lt;b&gt;Client/Sender&lt;/b&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Strict certificate validation&lt;/b&gt;.  Validate MX certificates and verify them by matching the hostname of the server with the name in the certificate presented by the server. A soft validation is recommended initially, which is useful for Log and monitoring (see below).&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Log &amp;amp; monitoring&lt;/b&gt;. Data related to validation failures when connecting to a recipient server help to detect active network attacks. Log events such as STARTTLS=false, MX mismatches, and cert validation failures for this purpose.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Keep up to date with root CA certificates bundle&lt;/b&gt;. SMTP clients, unlike browsers, have no standard mechanism to update CA bundles. In recent years, Microsoft and Mozilla pruned their CA bundle and removed many old root certificates. Our recommendation is to keep your root CA bundles up to date, irrespective of which root CA bundle you trust.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Certificate revocation support (CRL, OCSP, OCSP stapling)&lt;/b&gt;. Considering the opportunistic nature of current SMTP deployments, until now there was no compelling reason to check whether the certificates presented by servers are revoked or not. But this feature may become more important in coming years.&lt;br/&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Recommendations&lt;/h2&gt;&lt;p&gt;The use of STARTTLS is common and widespread; however, its growth has slowed in recent years. Through our study, we found that providers with good/valid certificates have better TLS settings compared to others. There is an important and fundamental need to improve the quality of STARTTLS deployment in order  to protect messages &amp;ndash; and therefore, users &amp;ndash; from active network attacks. As a baseline requirement, email providers should work to eliminate self-signed, expired certificates and use good ciphers with PFS on SMTP servers. Senders should validate the certificates and log validation failures, as the failure logs can provide valuable insights and use it for reporting.&lt;/p&gt;&lt;h2&gt;Appendix&lt;/h2&gt;&lt;p&gt;TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication &lt;a href="http://arxiv.org/pdf/1511.00341v2.pdf"&gt;http://arxiv.org/pdf/1511.00341v2.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large &lt;a href="http://arxiv.org/pdf/1510.08646v2.pdf"&gt;http://arxiv.org/pdf/1510.08646v2.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Neither Snow Nor Rain Nor MITM&amp;hellip; An Empirical Analysis of Email Delivery Security &lt;a href="http://conferences2.sigcomm.org/imc/2015/papers/p27.pdf"&gt;http://conferences2.sigcomm.org/imc/2015/papers/p27.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Analysis of TLS in SMTP World &lt;a href="http://www.slideshare.net/BinuRamakrishnan/analysis-of-tls-in-smtp-world"&gt;http://www.slideshare.net/BinuRamakrishnan/analysis-of-tls-in-smtp-world&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The Current State of SMTP STARTTLS Deployment (2014) &lt;a href="https://www.facebook.com/notes/protect-the-graph/the-current-state-of-smtp-starttls-deployment/1453015901605223/"&gt;https://www.facebook.com/notes/protect-the-graph/the-current-state-of-smtp-starttls-deployment/1453015901605223/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Yep! We Poked all your mail daemons &lt;a href="http://www.slideshare.net/SBAResearch/yep-we-poked-all-your-mail-daemons"&gt;http://www.slideshare.net/SBAResearch/yep-we-poked-all-your-mail-daemons&lt;/a&gt;&lt;/p&gt;&lt;p&gt;STARTTLS Everywhere (2014) &lt;a href="https://github.com/EFForg/starttls-everywhere"&gt;https://github.com/EFForg/starttls-everywhere&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;Acknowledgments: We want to thank Mike Shema, Elizabeth Zwicky, Suzanne Philion, and colleagues from Yahoo Mail Delivery and Paranoids teams for their support and contribution to this work.&lt;/i&gt;&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/141495385400</link><guid>https://yahoo-security.tumblr.com/post/141495385400</guid><pubDate>Tue, 22 Mar 2016 13:09:32 -0400</pubDate><category>security</category><category>smtp</category><category>starttls</category><category>email</category></item><item><title>Kill Your Password with Yahoo Account Key</title><description>&lt;p&gt;&lt;i&gt;By Lovlesh Chhabra, Product Manager&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Passwords can be a hassle - they’re easy to lose track of and forget, or they are weak passwords that are vulnerable to hacking. At Yahoo, we are moving fast in our mission to “kill the password” and make it easier for users to sign in without sacrificing security.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;With Yahoo Account Key, you can easily and securely sign in to your Yahoo account using your mobile phone. Whether you use Yahoo Finance, Fantasy, Mail, Messenger, and Sports for iOS or Android, each time you sign in, you will receive a push notification on your mobile phone for you to approve. Once you tap it, you’ll be signed in immediately. It’s secure, and there’s no need to remember a difficult password. Read on for how to set up Account Key.&lt;/p&gt;&lt;figure class="tmblr-embed tmblr-full" data-provider="youtube" data-orig-width="540" data-orig-height="304" data-url="https%3A%2F%2Fwww.youtube.com%2Fembed%2FI_eP1wh09HA"&gt;&lt;iframe width="540" height="304" id="youtube_iframe" src="https://www.youtube.com/embed/I_eP1wh09HA?feature=oembed&amp;amp;enablejsapi=1&amp;amp;origin=https://safe.txmblr.com&amp;amp;wmode=opaque" frameborder="0" allowfullscreen=""&gt;&lt;/iframe&gt;&lt;/figure&gt;&lt;p&gt;&lt;b&gt;&lt;br/&gt;&lt;/b&gt;&lt;b&gt;How to set up Account Key&lt;/b&gt;&lt;br/&gt;First, make sure you are signed into a Yahoo mobile app, then&lt;a href="https://login.yahoo.com/account/security/mc-yak-optin?soc_src=mail&amp;amp;soc_trk=ma"&gt; click here&lt;/a&gt; to set up Account Key. Or, you can follow the steps below.&lt;/p&gt;&lt;p&gt;In the Yahoo Mail app:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;On Android, tap the top left menu icon. On iPhone, tap the profile icon in the top right of the navigation bar.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Tap the key icon next to your account&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Tap Set up Account Key and follow the steps&lt;br/&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;In Yahoo Sports, Finance or other Yahoo apps:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Tap the top left menu icon&lt;br/&gt;&lt;/li&gt;&lt;li&gt;On Android, tap the key icon next to your account. On iPhone, select Account Key from the list (under the Tools section).&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Tap Set up Account Key and follow the steps&lt;br/&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;And now you’re ready to go! Next time you sign in from your desktop, we will send you a push notification to your mobile app. Simply open it and tap “Yes” to approve and sign in. Make sure not to sign out of your app or turn off notifications, as this will prevent you from receiving your Account Key push notification.&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/141266516770</link><guid>https://yahoo-security.tumblr.com/post/141266516770</guid><pubDate>Fri, 18 Mar 2016 14:54:45 -0400</pubDate><category>yahoo account key</category></item><item><title>Users First: Improving Proposed Wassenaar Arrangement Modifications</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://yahoopolicy.tumblr.com/post/137166173148"&gt;yahoopolicy&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Christopher Rohlf, Senior Manager, Penetration Testing&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;Later today the House Oversight and Government Reform Subcommittee on Information Technology, along with the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, will hold a hearing on the &lt;a href="http://www.wassenaar.org/"&gt;Wassenaar Arrangement&lt;/a&gt;, designed to restrict international sales of items with both civilian and military applications, and proposed changes on cybersecurity and export control. We welcome this opportunity for Congressional representatives to hear from expert industry stakeholders as they review the proposed 2013 Wassenaar Arrangement cybersecurity technologies additions. The hearing will highlight the impact these changes will have on American businesses and the cybersecurity industry. We thank the Co-Chairs, Rep. Will Hurd and Rep. John Ratcliffe, for their leadership on this issue, as well as the 125 bipartisan Members of Congress who &lt;a href="https://langevin.house.gov/sites/langevin.house.gov/files/documents/12-16-15_Langevin-McCaul_Wassenaar_Letter.pdf"&gt;expressed concerns &lt;/a&gt;about the impact of the current rules on cybersecurity and research.  &lt;br/&gt;&lt;/p&gt;
&lt;p&gt;At Yahoo, we are committed to protecting our users. As written, the proposed rule changes to the Wassenaar Arrangement will have unintended consequences that would undermine the ability of companies to protect and enhance the safety and security of their networks and users’ information.  For example:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;b&gt;Overly Broad Language&lt;/b&gt;: The current language defines ‘intrusion software’ so broadly that the inevitable result is a regulation that becomes burdened with exception clauses for specific products. This harms our ability to get access to and use these products in real time to defend ourselves.&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;Lack Of Intra-Company/Party Exception&lt;/b&gt;: The proposed language has no intra-company exception. This makes it difficult for global companies such as Yahoo to properly defend themselves in the face of a sophisticated attack. &lt;/li&gt;
&lt;li&gt;
&lt;b&gt;Bug Bounty&lt;/b&gt;: At Yahoo, we rely on our &lt;a href="https://hackerone.com/yahoo"&gt;bug bounty&lt;/a&gt; community of security researchers to help keep Yahoo secure by crowdsourcing our vulnerability discovery efforts. Sometimes this involves exchanging detailed information about exploits with researchers all over the world. The proposed language makes this risky and difficult to do.&lt;/li&gt;
&lt;li&gt;
&lt;b&gt;Information Sharing&lt;/b&gt;: We may lose the ability to easily share information with colleagues and partners through effective, collaborative mediums.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;We will continue to work with policymakers to propose constructive solutions, for example including an intra-company/party exception, encourage a better focus on exfiltration and the use of cybersecurity items for unauthorized activities, request additional clarity around acceptable uses that do not require a license, and sharpening the definition of specific technologies named in the control. By introducing these modifications, Yahoo – and other tech companies – could continue our proactive work to ensure the highest level of safety and security for our users around the world. &lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/137166395805</link><guid>https://yahoo-security.tumblr.com/post/137166395805</guid><pubDate>Tue, 12 Jan 2016 13:33:01 -0500</pubDate></item><item><title>Taking our Bug Bounty Program to the next level</title><description>&lt;p&gt;Happy New Year!&lt;b&gt;&lt;br/&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The Yahoo Paranoids are excited to announce a restructuring of our &lt;a href="https://hackerone.com/yahoo"&gt;Bug Bounty Program&lt;/a&gt; geared toward continuing to protect our users while encouraging our security reporters to submit high quality reports. We’ve been running our Bug Bounty Program for two years now and it has helped us ensure our users have the safest possible online experience. We’re proud of the security community that we’ve built through our program, with over 1,800 participating hackers who have helped Yahoo resolve more than 2,500 bugs.&lt;/p&gt;&lt;p&gt;Our Bug Bounty Program continues to play a critical role in the overall security posture of Yahoo, provides a safe learning environment for both new and experienced security researchers, and above all helps to ensure Yahoo products and systems are as secure as possible to provide the greatest value to our users.&lt;/p&gt;&lt;p&gt;We will continue to enforce a strict set of rules to maintain focus and prevent individuals acting outside the spirit of the program. We also want to encourage more accurate and well-documented reports. We occasionally encounter ambiguous vulnerabilities or reports that lack reproducible steps. To help highlight the kinds of impactful vulnerabilities we’re looking for, we’ve updated the list of properties and bug classes that are in-scope. We hope these changes will serve to help focus researchers towards better quality (and higher paying!) bounties.&lt;/p&gt;&lt;p&gt;All bugs submitted prior to the date and time of this message will be considered under the previous set of guidelines. The new rules are now live at &lt;a href="https://hackerone.com/yahoo"&gt;https://hackerone.com/yahoo&lt;/a&gt;. Good hunting!&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/136619322000</link><guid>https://yahoo-security.tumblr.com/post/136619322000</guid><pubDate>Mon, 04 Jan 2016 13:26:13 -0500</pubDate><category>security</category><category>bugbounty</category></item><item><title>Notifying Our Users of Attacks by Suspected State-Sponsored Actors</title><description>&lt;p&gt;&lt;i&gt;By: Bob Lord, Chief Information Security Officer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;We’re committed to protecting the security and safety of our users, and we strive to detect and prevent unauthorized access to user accounts by third parties. As part of this effort, Yahoo will now notify you if we strongly suspect that your account may have been targeted by a state-sponsored actor.  We’ll provide these specific notifications so that our users can take appropriate measures to protect their accounts and devices in light of these sophisticated attacks.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Our notifications provide targeted users with specific actions they can take to help ensure that their Yahoo accounts are safe and secure. If you receive such a notification from us, here are some of the actions you should take immediately:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Turn on&lt;a href="https://help.yahoo.com/kb/SLN25781.html"&gt; Account Key&lt;/a&gt; or&lt;a href="https://help.yahoo.com/kb/SLN5013.html"&gt; Two-Step Verification&lt;/a&gt; to approve or deny sign-in notifications, which grant or refuse access to your account.&lt;/li&gt;&lt;li&gt;Choose a strong, unique Yahoo account password you’ve never shared or used before.&lt;a href="https://help.yahoo.com/kb/create-strong-password-sln3012.html"&gt; Review our guidelines for creating a strong password&lt;/a&gt; and&lt;a href="https://help.yahoo.com/kb/account/reset-yahoo-password-sln2047.html"&gt; change your account’s password&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Check that your&lt;a href="https://help.yahoo.com/kb/update-accounts-personal-recovery-info-sln2717.html"&gt; account recovery information&lt;/a&gt; (phone number or alternate recovery email address) is up to date and that you still have access to them.  Remove ones that you no longer have access to or don’t recognize.&lt;/li&gt;&lt;li&gt;Check your&lt;a href="https://help.yahoo.com/kb/automatically-forward-emails-yahoo-mail-sln22028.html"&gt; mail forwarding&lt;/a&gt; and&lt;a href="https://help.yahoo.com/kb/reply-to-address-yahoo-mail-sln22036.html"&gt; reply-to settings&lt;/a&gt;. Hackers could edit these settings to receive copies of emails you send or receive.&lt;/li&gt;&lt;li&gt;&lt;a href="https://help.yahoo.com/kb/check-accounts-login-activity-sln2073.html"&gt;Review your recent activity in your account settings&lt;/a&gt; for sessions you don’t recognize.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;We also strongly encourage you to protect yourself outside of your Yahoo account:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Don’t fall for phishing attacks! Don’t click links if you’re not sure about them.&lt;a href="https://help.yahoo.com/kb/received-request-account-credit-card-information-sln3500.html"&gt; Yahoo will never ask you to provide your account information via email&lt;/a&gt;. If an email includes a link to Yahoo that asks for your password, close the window and sign in via&lt;a href="https://login.yahoo.com/"&gt; https://login.yahoo.com&lt;/a&gt; directly.&lt;/li&gt;&lt;li&gt;Install anti-virus software on your computer and ensure that your computer and other devices have all the latest security updates applied.&lt;/li&gt;&lt;li&gt;Review the account security guidelines posted by other services you use. For example, social networks, financial institutions, and other email providers. Follow their guidelines to secure those accounts, too.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It’s important to note that if you receive one of these notifications, it does not necessarily mean that your account has been compromised. Rather, we strongly suspect that you may have been a target of an attack, and want to encourage you to take steps to secure your online presence. In addition, these warnings to our users do not indicate that Yahoo’s internal systems have been compromised in any way.  &lt;br/&gt;&lt;/p&gt;&lt;p&gt;So how do we know if an attack is state-sponsored? In order to prevent the actors from learning our detection methods, we do not share any details publicly about these attacks. However, rest assured we only send these notifications of suspected attacks by state-sponsored actors when we have a high degree of confidence. &lt;/p&gt;&lt;p&gt;We will continue to refine our detection and notification of state-sponsored threats and remain committed keeping your account safe from unauthorized access. &lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/135674131435</link><guid>https://yahoo-security.tumblr.com/post/135674131435</guid><pubDate>Mon, 21 Dec 2015 19:32:11 -0500</pubDate><category>usersfirst</category></item><item><title>Attacking HTTP/2 Implementations</title><description>&lt;p&gt;Introduction&lt;br/&gt;&lt;/p&gt;&lt;p&gt;Yahoo Pentest Team members Stuart Larsen (@xc0nradx) and John Villamil (@day6reak) presented original research at Pacsec 2015 on the HTTP/2 protocol, its security implications, and flaws discovered in a number of implementations. Through this presentation, summarized below, we hope to make the protocol a more popular research target. What follows is a summary of our presentation given at Pacsec 2015 (&lt;a href="http://www.slideshare.net/JohnVillamil/attacking-http2-implementations-1"&gt;slides&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;HTTP/2 is a new technology that is already seeing widespread use across the Internet. There has been little security research into this new protocol yet multiple implementations and widespread adoptions already exist. HTTP/2 lives in browsers, caching proxies, and libraries. It is the undisputed future of Internet connections and vulnerabilities in this protocol have the potential to cripple infrastructure. Our talk focused on threats, attack vectors, and vulnerabilities found during the course of our research. Two Firefox, two &lt;a href="http://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing"&gt;Apache Traffic Server (ATS)&lt;/a&gt;, and four Node-http2 vulnerabilities will be discussed alongside the release of the first public HTTP/2 fuzzer. We showed how these bugs were found, their root cause, why they occur, and how to trigger them.&lt;/p&gt;&lt;p&gt;We will also discuss &lt;a href="https://github.com/c0nrad/http2fuzz"&gt;http2fuzz&lt;/a&gt;, a fuzzer for both client and server endpoints of HTTP/2 connections. The fuzzer is open source and written in Go. It implements a large part of the HTTP/2 protocol and supports various frame types. It also includes a unique replay mechanism to help track down crash causing packets. We had &lt;a href="http://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing."&gt;previously blogged&lt;/a&gt; about two ATS bugs found by an earlier version of this fuzzer.&lt;/p&gt;&lt;h2&gt;Overview&lt;/h2&gt;&lt;p&gt;HTTP/1.1 came out back in 1999 and it was a huge step in bringing the web forward. But since then, websites have grown drastically, and HTTP had to be revisited. Today’s sites are much more complex with many more interconnected dependencies. ISP speeds have improved and more bandwidth is available. &lt;/p&gt;&lt;p&gt;The changes from HTTP/1.1 to HTTP/2 are all about performance. The major changes are:&lt;/p&gt;&lt;p&gt;- Binary Protocol / Compression&lt;/p&gt;&lt;p&gt;- Multiplexing&lt;/p&gt;&lt;p&gt;- Server Push&lt;/p&gt;&lt;p&gt;- Frames&lt;/p&gt;&lt;p&gt;But these new changes in functionality and complexity also introduce additional attack surface to HTTP implementations. &lt;/p&gt;&lt;h2&gt;HPACK&lt;/h2&gt;&lt;p&gt;Originally, HTTP was stateless. It followed a very simple model to make a request and receive a response. But that also means lots of redundant information is sent. HPACK (&lt;a href="https://tools.ietf.org/html/rfc7541"&gt;RFC7541&lt;/a&gt;) was released to address these and other issues.&lt;/p&gt;&lt;p&gt;HPACK is a binary header compression protocol. It uses dynamic lookup tables to store and retrieve headers. Headers only need to be sent once, and are remembered for future requests on the same connection. This differential encoding saves space and time and is a huge improvement over the vanilla protocol.&lt;/p&gt;&lt;h2&gt;Frames&lt;/h2&gt;&lt;figure class="tmblr-full" data-orig-height="411" data-orig-width="793"&gt;&lt;img src="https://78.media.tumblr.com/e283e79011a2bb0fe922300259ea60f4/tumblr_inline_nyuu1kevdj1sbr0wj_540.png" data-orig-height="411" data-orig-width="793"/&gt;&lt;/figure&gt;&lt;p&gt;Frames are the fundamental unit of communication within HTTP/2. Here is a typical HTTP/2 header visualized:&lt;/p&gt;&lt;p&gt;There are 10 different types of frames:&lt;/p&gt;&lt;p&gt;- Headers&lt;/p&gt;&lt;p&gt;- Data&lt;/p&gt;&lt;p&gt;- Priority&lt;/p&gt;&lt;p&gt;- Reset&lt;/p&gt;&lt;p&gt;- Settings&lt;/p&gt;&lt;p&gt;- Push&lt;/p&gt;&lt;p&gt;- Ping&lt;/p&gt;&lt;p&gt;- Goaway&lt;/p&gt;&lt;p&gt;- Update&lt;/p&gt;&lt;p&gt;- Continuation&lt;/p&gt;&lt;p&gt;To learn more about individual frames, checkout the &lt;a href="https://tools.ietf.org/html/rfc7540"&gt;RFC&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;Push Promise&lt;/h2&gt;&lt;p&gt;Push Promise is a new feature of HTTP/2 that allows you to push resources to a client before the client requests them. For example if a client requests /index.html, the server can probably assume the client will also want /logo.png.&lt;/p&gt;&lt;h2&gt;New Attack Surface&lt;/h2&gt;&lt;p&gt;- HPACK&lt;/p&gt;&lt;p&gt;- Upgrades / Downgrades&lt;/p&gt;&lt;p&gt;- Inconsistent Multiplexing&lt;/p&gt;&lt;p&gt;- Malformed Frames&lt;/p&gt;&lt;p&gt;- Pushing arbitrary data to client&lt;/p&gt;&lt;p&gt;- Pushing arbitrary data to server&lt;/p&gt;&lt;p&gt;- Stream dependencies&lt;/p&gt;&lt;p&gt;- Invalid Frame States&lt;/p&gt;&lt;p&gt;With all of this new attack surface we needed an automated way of getting good code coverage in HTTP2 implementations. For this we decided to build a &lt;a href="https://github.com/c0nrad/http2fuzz"&gt;new fuzzer&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;http2fuzz&lt;/h2&gt;&lt;p&gt;http2fuzz is a fuzzer written in golang for fuzzing HTTP/2 implementations in either server or client mode.&lt;/p&gt;&lt;p&gt;It has a variety of strategies for both smart and dumb fuzzing. It can either rebuild valid frame structures with invalid data, or use completely random data.&lt;/p&gt;&lt;p&gt;A big challenge in fuzzing is determining what payload actually caused the target to crash. We decided to build a replay feature that saves each frame that is sent. If a crash occurs, the replay list can be inspected and minimized to determine which payload was the cause of the crash.&lt;/p&gt;&lt;h2&gt;Bugs 1,2: Apache Traffic Server&lt;/h2&gt;&lt;p&gt;Our fuzzer discovered two remotely exploitable vulnerabilities in Apache Traffic Server. Both of these had the potential for arbitrary code execution. These bugs were covered in a previous &lt;a href="http://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing"&gt;blog post&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;Bug 3: Firefox HTTP/2 Malformed Header Frame DoS&lt;/h2&gt;&lt;p&gt;Normally a header frame consists of a pad length, stream dependency identifier, weight, block header fragment, and padding. If only a single byte is sent an integer underflow occurs which causes nsCString to try to allocate nearly 2^32 bytes of memory.&lt;/p&gt;&lt;p&gt;&lt;a href="https://hg.mozilla.org/mozilla-central/file/tip/netwerk/protocol/http/Http2Session.cpp#l1238"&gt;HTTP2Session.cpp:1226&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;[1226]:   self-&amp;gt;mDecompressBuffer.Append(self-&amp;gt;mInputFrameBuffer + kFrameHeaderBytes + paddingControlBytes + promiseLen , self-&amp;gt;mInputFrameDataSize - paddingControlBytes - promiseLen - paddingLength);&lt;/p&gt;&lt;p&gt;[1226]:   self-&amp;gt;mDecompressBuffer.Append(ptr + uint8_t(9) + uint8_t(0) + uint16_t(0) , uint32_t(1) - uint8_t(8) - uint32_t(5) - uint16_t(0));&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;As shown above, an underflow is caused in the second parameter of the buffer decompress. These issues were addressed by the Firefox developers.&lt;/p&gt;&lt;h2&gt;Bug 4: Firefox HTTP/2 Malformed Push Promise DoS&lt;/h2&gt;&lt;p&gt;This bug is very similar to the previous bug except it occurs inside push promise.&lt;/p&gt;&lt;p&gt;&lt;a href="https://hg.mozilla.org/mozilla-central/file/tip/netwerk/protocol/http/Http2Session.cpp#l1634"&gt;HTTP2Session.cpp:1634&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;[1634]:   self-&amp;gt;mDecompressBuffer.Append(self-&amp;gt;mInputFrameBuffer + kFrameHeaderBytes + paddingControlBytes + promiseLen , self-&amp;gt;mInputFrameDataSize - paddingControlBytes - promiseLen - paddingLength);&lt;/p&gt;&lt;p&gt;[1634]:   self-&amp;gt;mDecompressBuffer.Append(ptr + uint8_t(9) + uint8_t(1) + uint16_t(4) , uint32_t(76) - uint8_t(1) - uint32_t(4) - uint16_t(75));&lt;/p&gt;&lt;/blockquote&gt;&lt;h2&gt;Bugs 5-8: &lt;a href="https://github.com/molnarg/node-http2"&gt;node-http2&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;We found a number of bugs inside node-http2 through fuzzing. Most of them involve buffer out of bound reads or invalid state handling within Javascript. These issues do not appear exploitable for arbitrary code execution but could be used to perform denial of service attacks against Node based web servers that use the package.&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/molnarg/node-http2/issues/145"&gt;https://github.com/molnarg/node-http2/issues/145&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/molnarg/node-http2/issues/146"&gt;https://github.com/molnarg/node-http2/issues/146&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/molnarg/node-http2/issues/147"&gt;https://github.com/molnarg/node-http2/issues/147&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://github.com/molnarg/node-http2/issues/148"&gt;https://github.com/molnarg/node-http2/issues/148&lt;/a&gt;&lt;/p&gt;&lt;p&gt;[*] These issues have not been addressed by the project maintainers. The package no longer appears to be in active development.&lt;/p&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;p&gt;HTTP/2 brings with it a lot of new attack surface. More research needs to be conducted on the implications of this protocol on web security. New tools need to be developed which handle the protocol and allow penetration testers to effectively audit HTTP/2 based web sites. Security products, including NIDS, will need to implement a subset of the protocol to effectively audit connections for malicious behavior or exploits. Lastly, more testing needs to be done on implementations of the protocol before they are enabled for popular use.&lt;/p&gt;&lt;p&gt;Stuart Larsen and John Villamil of the Yahoo Pentest Team&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/134549767190</link><guid>https://yahoo-security.tumblr.com/post/134549767190</guid><pubDate>Fri, 04 Dec 2015 17:22:28 -0500</pubDate><category>security</category><category>paranoids</category><category>pentest</category></item><item><title>First Bay Area Crypto Day</title><description>&lt;p&gt;&lt;b&gt;Friday November 20, at UC Berkeley&lt;/b&gt;&lt;/p&gt;&lt;figure data-orig-width="449" data-orig-height="336" class="tmblr-full"&gt;&lt;img src="https://78.media.tumblr.com/ce0b630aa62b57c74971d68401d48536/tumblr_inline_ny330shLOQ1sbr0wj_540.png" data-orig-width="449" data-orig-height="336"/&gt;&lt;/figure&gt;&lt;p&gt;Recent years have witnessed exciting progress in the development of cryptographic techniques enabling new functionalities and ways of interaction, such as fully homomorphic encryption, program obfuscation and verifiable outsourcing of computation. &lt;a href="https://labs.yahoo.com/"&gt;Yahoo Labs&lt;/a&gt;, in cooperation with Stanford University and UC Berkeley, is starting a series of one-day workshops for Bay Area researchers to present and discuss the latest developments in the discipline. The first event will take place at UC Berkeley on Friday, November 20. The workshop’s program and other relevant information can be found &lt;a href="https://sites.google.com/site/bayareacryptoday"&gt;here&lt;/a&gt;. &lt;br/&gt;&lt;/p&gt;</description><link>https://yahoo-security.tumblr.com/post/133554804465</link><guid>https://yahoo-security.tumblr.com/post/133554804465</guid><pubDate>Thu, 19 Nov 2015 17:47:24 -0500</pubDate></item><item><title>Welcome to our new CISO, Bob Lord!</title><description>&lt;p&gt;&lt;a class="tumblr_blog" href="http://yahoo.tumblr.com/post/131945816434"&gt;yahoo&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;i&gt;By Jay Rossiter, SVP, Product &amp;amp; Engineering, Science &amp;amp; Technology&lt;/i&gt;&lt;br/&gt;&lt;/p&gt;
&lt;p&gt;I’m so pleased to welcome Bob Lord as Yahoo’s new Chief Information Security Officer (CISO). Bob brings more than twenty years of significant experience in the information security space, most recently as CISO-in-Residence at Rapid 7. Before that, Bob was Twitter’s first security hire, heading up their information security program. In this role he established Twitter’s efforts in compliance, application security, product security, and information security. Previously he held positions in product and information security at companies like Red Hat, AOL, and Netscape.&lt;/p&gt;
&lt;p&gt;Security has never been a more important priority for our company and the subject of global debate than right now. At Yahoo, we’re committed to protecting our users’ security and maintaining their trust. We offer users encrypted products, provide an &lt;a href="https://github.com/yahoo/end-to-end"&gt;end-to-end encryption plugin on GitHub&lt;/a&gt; for Yahoo Mail, offer two-factor authentication, and have taken an important step toward a password-free future through &lt;a href="http://yahoo.tumblr.com/post/131217402654/introducing-the-new-yahoo-mail-app-multiple"&gt;Yahoo Account Key&lt;/a&gt;, which allows users a fast and secure way to access their Yahoo accounts.&lt;/p&gt;
&lt;p&gt;Bob will lead our security team – known as the Paranoids – in offensive and defensive protection of our more than one billion users around the world and for our employees globally. He’ll work closely across our teams and collaboratively across the industry to ensure that we’re providing the highest level of security possible to our users, and continue to provide our users with the latest security innovations.&lt;/p&gt;
&lt;p&gt;Stay tuned for updates from Bob around our continued efforts to protect our users’ security and maintain their trust.&lt;/p&gt;
&lt;/blockquote&gt;</description><link>https://yahoo-security.tumblr.com/post/131950007425</link><guid>https://yahoo-security.tumblr.com/post/131950007425</guid><pubDate>Mon, 26 Oct 2015 09:42:18 -0400</pubDate></item></channel></rss>
