SlideShare a Scribd company logo
1 of 24
SEMINAR ON YAHOO MAIL CYBER
ATTACK
Submitted to: Submitted by:
Sr. Lect. Shikha Maheshwari Rohit kumar mishra
Sr. Lect. Arihant Jain
Yahoo Mail
 Yahoo is the second-largest email service
worldwide, after Google's Gmail, according to
the research firm comScore.
 There are 273 millionYahoo mail accounts
worldwide, including 81 million in the U.S.
What happened In Yahoo Mail
Cyber Attack
 The cyber attack on yahoo was on 30 jan 2014.
 The attackers likely targeted third-party
databases to obtain customer usernames and
passwords.
 company said that on 30 jan 2014, a “handful”
of its servers were impacted but said there
was no evidence of a compromise to user
data.
 Yahoo Inc. said in a blog post on its breach
that "The information sought in the attack
seems to be names and email addresses from
the affected accounts most recent sent
emails."
Company Statement After
Accounts were hacked
Reaction Of Yahoo On Attack
 Yahoo said it is resetting passwords on affected
accounts and has "implemented additional
measures" to block further attacks.
 The company would not comment beyond the
information in its blog post. It said it is working
with federal law enforcement.
Continued…
 “These attackers had mutated their exploit,
likely with the goal of bypassing IDS/IDP orWAF
filters”.
 This mutation happened to exactly fit a
command injection bug in a monitoring script
our Sports team was using at that moment to
parse and debug their web logs.
What was the Criminals' End-
Game?
 By reading the recent emails found in the Inbox
and Sent mail, the criminals are likely able to
determine other places where theYahoo email
user has additional accounts.
 Based on our current findings, the list of
usernames and passwords that were used to
execute the attack was likely collected from a
third-party database compromise.
Type Of File Used
 The bit.ly URL that is used in the attachment to
the affected users.
 The attackers have apparently been referencing
a non-existent MSNBC news report in the email.
 Redirects to a fake MSNBC page that reportedly
hijacks yourYahoo Mail account immediately if
you are logged in.
Techniques by which cyber
attacks are done
 Socially engineeredTrojans
 Unpatched software
 Phishing attacks
Socially engineered Trojans
 Socially engineeredTrojans provide the No. 1
method of attack .
 An end-user browses to a website usually
trusted - which prompts him or her to run a
Trojan.
 The user executes the malware, clicking past
browser warnings that the program could
possibly be harmful.
Countermeasure For Socially
engineered Trojans
 Social engineeredTrojans are best handled
through end-user education that's informed
by today's threats.
 An up-to-date antimalware program can't
hurt, but strong end-user education provides
better bang for the buck.
Unpatched software
 Coming in a distant second is software with
known, but Unpatched exploits.
 The most common Unpatched and exploited
programs are Java, Adobe Reader, and Adobe
Flash.
Countermeasure For Unpatched
software
 Stop what you're doing right now and make sure
your patching is perfect.
 If you can't, make sure it's perfect around the top
most exploited products, including Java, Adobe,
browser admins, OS patches, and more.
Phishing attacks
 Everything looks great; it even warns the
reader not to fall for fraudulent emails.The
only thing that gives them away is the rogue
link asking for confidential information.
 Approximately 70 percent of email is spam.
Countermeasure For Phishing
attacks
 Decreasing risk from phishing attacks is
mostly accomplished through better end-user
education -- and with better antiphishing
tools.
 Make sure your browser has antiphishing
capabilities.
Method Used To Hack Yahoo
Mail
 The phishing method was used in yahoo mail
cyber attack .
 In general it is a way of attempting to acquire
information such as usernames, passwords,
and credit card details by masquerading as a
trustworthy entity in an electronic
communication.
Type Of Phishing
 Spear phishing
 Clone phishing
 Whaling
 Rogue WiFi (MitM)
Spear phishing
 Phishing attempts directed at specific individuals
or companies have been termed spear phishing.
 Attackers may gather personal information
about their target to increase their probability of
success.
 This technique is, by far, the most successful on
the internet today, accounting for 91% of
attacks.
Clone phishing
 A type of phishing attack whereby a legitimate,
and previously delivered, email containing an
attachment or link has had its content and
recipient address(es) taken and used to create an
almost identical or cloned email.
 The attachment or link within the email is
replaced with a malicious version and then sent
from an email address spoofed to appear to
come from the original sender.
Whaling
 Several recent phishing attacks have been
directed specifically at senior executives and
other high profile targets within businesses,
and the term whaling has been coined for
these kinds of attacks.
Rogue WiFi (MitM)
 Attackers set up or compromise freeWifi access-
points, and configure them to run man-in-the-
middle (MitM) attacks, often with tools like
sslstrip, to compromise all access point users.
What Yahoo Have Done After
Attack
 The company has taken a few steps to ensure
your security is restored by sending
notification e-mails that instruct users who's
Yahoo Mail accounts have been broken into
to change their passwords.
 They asked the users who got in touch with
them if they got such an email and clicked on
the link.
The Steps To Be Followed When
Yahoo Account Has Hacked
 If yourYahoo Mail account has been hacked, you
should make sure to change log-in credentials.
 If you have a similar user name at Gmail or
Twitter or any other social networking site, it
would be a good idea to change that information
as well.
 Be wary of any odd e-mails from theYahoo
contacts and never click on any links inside of
messages.
THANK YOU

More Related Content

What's hot

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection schemeMussavir Shaikh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

What's hot (20)

PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Viewers also liked (15)

Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation Data
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 

Similar to Seminar on yahoo mail cyber attack

Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !Theawaster485
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfEvs, Lahore
 
Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingCSITiaesprime
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfuzair
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 

Similar to Seminar on yahoo mail cyber attack (20)

Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Phishing
PhishingPhishing
Phishing
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processing
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdf
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Seminar on yahoo mail cyber attack

  • 1. SEMINAR ON YAHOO MAIL CYBER ATTACK Submitted to: Submitted by: Sr. Lect. Shikha Maheshwari Rohit kumar mishra Sr. Lect. Arihant Jain
  • 2. Yahoo Mail  Yahoo is the second-largest email service worldwide, after Google's Gmail, according to the research firm comScore.  There are 273 millionYahoo mail accounts worldwide, including 81 million in the U.S.
  • 3. What happened In Yahoo Mail Cyber Attack  The cyber attack on yahoo was on 30 jan 2014.  The attackers likely targeted third-party databases to obtain customer usernames and passwords.
  • 4.  company said that on 30 jan 2014, a “handful” of its servers were impacted but said there was no evidence of a compromise to user data.  Yahoo Inc. said in a blog post on its breach that "The information sought in the attack seems to be names and email addresses from the affected accounts most recent sent emails." Company Statement After Accounts were hacked
  • 5. Reaction Of Yahoo On Attack  Yahoo said it is resetting passwords on affected accounts and has "implemented additional measures" to block further attacks.  The company would not comment beyond the information in its blog post. It said it is working with federal law enforcement. Continued…
  • 6.  “These attackers had mutated their exploit, likely with the goal of bypassing IDS/IDP orWAF filters”.  This mutation happened to exactly fit a command injection bug in a monitoring script our Sports team was using at that moment to parse and debug their web logs.
  • 7. What was the Criminals' End- Game?  By reading the recent emails found in the Inbox and Sent mail, the criminals are likely able to determine other places where theYahoo email user has additional accounts.  Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise.
  • 8. Type Of File Used  The bit.ly URL that is used in the attachment to the affected users.  The attackers have apparently been referencing a non-existent MSNBC news report in the email.  Redirects to a fake MSNBC page that reportedly hijacks yourYahoo Mail account immediately if you are logged in.
  • 9. Techniques by which cyber attacks are done  Socially engineeredTrojans  Unpatched software  Phishing attacks
  • 10. Socially engineered Trojans  Socially engineeredTrojans provide the No. 1 method of attack .  An end-user browses to a website usually trusted - which prompts him or her to run a Trojan.  The user executes the malware, clicking past browser warnings that the program could possibly be harmful.
  • 11. Countermeasure For Socially engineered Trojans  Social engineeredTrojans are best handled through end-user education that's informed by today's threats.  An up-to-date antimalware program can't hurt, but strong end-user education provides better bang for the buck.
  • 12. Unpatched software  Coming in a distant second is software with known, but Unpatched exploits.  The most common Unpatched and exploited programs are Java, Adobe Reader, and Adobe Flash.
  • 13. Countermeasure For Unpatched software  Stop what you're doing right now and make sure your patching is perfect.  If you can't, make sure it's perfect around the top most exploited products, including Java, Adobe, browser admins, OS patches, and more.
  • 14. Phishing attacks  Everything looks great; it even warns the reader not to fall for fraudulent emails.The only thing that gives them away is the rogue link asking for confidential information.  Approximately 70 percent of email is spam.
  • 15. Countermeasure For Phishing attacks  Decreasing risk from phishing attacks is mostly accomplished through better end-user education -- and with better antiphishing tools.  Make sure your browser has antiphishing capabilities.
  • 16. Method Used To Hack Yahoo Mail  The phishing method was used in yahoo mail cyber attack .  In general it is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 17. Type Of Phishing  Spear phishing  Clone phishing  Whaling  Rogue WiFi (MitM)
  • 18. Spear phishing  Phishing attempts directed at specific individuals or companies have been termed spear phishing.  Attackers may gather personal information about their target to increase their probability of success.  This technique is, by far, the most successful on the internet today, accounting for 91% of attacks.
  • 19. Clone phishing  A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.  The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender.
  • 20. Whaling  Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.
  • 21. Rogue WiFi (MitM)  Attackers set up or compromise freeWifi access- points, and configure them to run man-in-the- middle (MitM) attacks, often with tools like sslstrip, to compromise all access point users.
  • 22. What Yahoo Have Done After Attack  The company has taken a few steps to ensure your security is restored by sending notification e-mails that instruct users who's Yahoo Mail accounts have been broken into to change their passwords.  They asked the users who got in touch with them if they got such an email and clicked on the link.
  • 23. The Steps To Be Followed When Yahoo Account Has Hacked  If yourYahoo Mail account has been hacked, you should make sure to change log-in credentials.  If you have a similar user name at Gmail or Twitter or any other social networking site, it would be a good idea to change that information as well.  Be wary of any odd e-mails from theYahoo contacts and never click on any links inside of messages.