Yahoo Mail hacked via XSS exploit, loophole fixed soon after

Reports about a malicious link compromising the security of several Yahoo! Mail accounts surfaced yesterday. The Next Web reports that a hacker going by the name Shahin Ramezany uploaded a YouTube video demonstrating how a Yahoo! account can be compromised with a DOM-based XSS vulnerability that can be misused across all major browsers. Ramezany’s technique, as depicted in the video, comes across as simple and and can be done in a short time. In fact,  if Ramezany is to be believed, then as many as 400 million Yahoo! Mail users faced the risk of becoming victims of this vulnerability. Folks at TNW soon got in touch with Yahoo! to know more on the issue and this is what a Yahoo! spokesperson in the UK had to say, "We’ve been looking into it and the US have now confirmed that they are investigating too. They will be in touch if there is a comment – otherwise I recommend that if users are concerned then they should change their passwords immediately."  


Hacking attack but fixed



The spokesperson added, “At Yahoo! we take security very seriously and invest heavily in measures to protect our users and their data. We were recently informed of an online video that demonstrated a vulnerability. We confirm that the vulnerability has been fixed. In addition, we are investigating recent reports of increased abusive traffic and will work diligently to fix any vulnerabilities that are found. Concerned users are encouraged to change their passwords to a safe password that combines letters, numbers, and symbols.”


Twitter is abuzz with comments from those whose accounts were compromised in the attack. One user (Twitter handle - @mygzyap) wrote, "Seems someone tried to hack my Yahoo mail account. If you receive rogue e-mails from me, please let me know." Another one (Twitter handle - @ronicadesign) wrote, "My crap @yahoo email got hacked *again*. Deleted all my contacts about a yr. ago, after the first hack & it still sent out spam. DELETED."


In July last year, hackers belonging to a hacking collective called D33Ds Company retrieved and dumped login details of more than 400,000+ user accounts in plain text. A post on Trustedsec stated, "The passwords contained a wide variety of email addresses including those from,,, and much more." Interestingly, the post added that the affected website was a sub-domain of and that the compromised server may be Yahoo! Voice a.k.a Associated Content. "The affected website was only named as a sub-domain of However, digging through and searching for the hostname, the attacker forgot to remove the hostname “” (credit to Mubix for the hostname find)," Trustedsec wrote. The most worrisome bit was that the passwords that were stored were completely unencrypted, and as you're reading this, 400,000+ login credentials (comprising usernames and passwords) have been exposed.


It had been brought to light that the hackers used a union-based SQL injection attack to get away with the information stored in the database. The post on Trustedsec also put forth a glimpse of what the data leaked online looks like. 


A note at the end of the dump read, "We hope that the parties responsible for managing the security of this sub-domain will take this as a wake-up call and not as a threat. There have been many security holes exploited in webservers belonging to Yahoo! Inc. that have caused far greater damage than our disclosure. Please do not take them lightly. The sub-domain and vulnerable parameters have not been posted to avoid further damage."


Reporting on the issue, Ars Technica's Dan Goodin wrote that the union-based SQL injection hacking technique used here affects inadequately secured web applications that do not "properly scrutinize text entered into search boxes and other user input fields". He added, "By injecting powerful database commands into them, attackers can trick back-end servers into dumping huge amounts of sensitive information."

Published Date: Jan 08, 2013 04:51 pm | Updated Date: Jan 08, 2013 04:51 pm