TP-2013-0002 critical AI Draft A

Yahoo 2013 Data Breach

Date August 1, 2013
Attack Type Data Breach Sector Technology
Geography United States
Threat Actor Unknown
Attribution A4
Confidence A

Summary

In August 2013, an unknown actor breached Yahoo’s internal network and exfiltrated user data for all 3 billion accounts on the platform, making it one of the largest data breaches in history. The breach went undiscovered for over three years and was first disclosed publicly in December 2016 before being revised in 2017 to reflect the full 3 billion-account scope.

This page covers the separate, unattributed 2013 breach. The distinct 2014 FSB-directed intrusion is tracked in Yahoo 2014 Data Breach.

Technical Analysis

The exact intrusion pathway for the 2013 breach was never disclosed in exhaustive technical detail. What was eventually confirmed in 2017 was the total compromise of Yahoo’s user account database. The unknown adversaries bypassed perimeter security, accessed the database layer, and extracted the raw information representing the entirety of Yahoo’s user base.

The compromised data included names, email addresses, telephone numbers, dates of birth, hashed passwords, and security questions and answers. The failure of Yahoo’s internal discovery meant the attackers had uncontested retention of 3 billion identities for years prior to the forced password reset.

Attack Chain

Stage 1: Initial Compromise

An unknown actor gained unauthorized access to Yahoo’s corporate network through an unidentified vector in August 2013.

Stage 2: Database Exfiltration

The attackers extracted the core user database containing account metadata for 3 billion users, including identifying information and hashed passwords.

Impact Assessment

The 2013 breach was massive in volume, affecting 3 billion accounts. The breach exposed personal identifiers, password hashes, and security questions for nearly every Yahoo user at the time. It also forced broad password resets and heightened scrutiny of Yahoo’s account-security practices.

Attribution

Attribution for the 2013 breach was never publicly assigned, even after Yahoo revised the incident to its full 3 billion-account scope. The event remains an important historical marker because it demonstrated how long a major account-compromise can go undetected when database access is not aggressively monitored.

Timeline

2013-08-01 — Breach Occurs

Unknown attackers breach Yahoo’s systems and exfiltrate data for all Yahoo user accounts.

2016-12-14 — Initial Disclosure

Yahoo publicly discloses the 2013 breach, initially reporting 1 billion accounts compromised.

2017-10-03 — 3 Billion Accounts Revised

Yahoo revises the 2013 breach total to 3 billion accounts, representing every Yahoo account in existence at the time.

Remediation & Mitigation

Following the disclosure, Yahoo forced password resets and invalidated unencrypted security questions. The company migrated from MD5 to bcrypt password hashing. This event became a canonical teaching case regarding the risks of maintaining legacy, vulnerable cryptographic standards like MD5 on massive user databases.

Sources & References