There is little news coming out of Yahoo as the world waits to hear what exactly caused the theft of the details of 500 million Yahoo accounts, but inside the organisation, internal and external IT professionals will be working hard to find the answer.
Breach investigations take time, and with the attack having taken place over two years ago, records could be patchy.
Yet the findings of the investigation could either mean condemnation or vindication for Yahoo.
John Madelin, CEO at RelianceACSN, outlines some likely steps:
Stephen Gates, chief research intelligence analyst at NSFOCUS, says that Yahoo will have to follow a “popcorn trail” left behind by the attacker, if they can find it.
“Occasionally this is easy; more often it’s impossible. In most cases, trying to find the trail is directly affected by how long ago the breach happened. If evidence of the breach has been destroyed or overwritten over time, this will only make Yahoo’s efforts more difficult.”
Even in the “best case scenario” where Yahoo has kept detailed records, finding the right information could be a “needle in a haystack” task, according to Thomas Fischer, Global Security Advocate at Digital Guardian.
Says Rob Sobers, director at Varonis, the process overall could take “weeks if not months.”
If the investigation is successful, what will the findings be? Yahoo has released precious little detail about the successful attack except to suggest that a state-sponsored attacker was involved.
Matt Walker, VP Northern Europe at HEAT Software suggests a possible method of attack, saying that it is likely that the method will be similar to that of other large breaches.
He says that if this is the case, the attacker “would first have looked to deliver malware inside Yahoo’s system, most probably by exploiting an existing software vulnerability for which a remediation was already available.”
After this the malware would have hidden its presence, Walker says, before making a connection with the attacker and probing deeper into the network.
In this case it appears the attack concluded once the details of 500 million users had been copied and transferred.”
Thomas Fischer at Digital Guardian suggests some other possibilities: a vulnerable front-end web application, a zero-day attack on a server or the compromise of an administrator.
Yahoo has already been criticised by a prominent group of US senators for its failure to promptly disclose the breach, but the revelation of what actually caused the attack could be just as damaging if the internet giant had somehow failed to take basic defensive steps.
In the UK, TalkTalk was recently slapped with a £400,000 fine by the Information Commissioner’s Office (ICO) for failing to take basic steps to protect customer information, leading to the theft of the personal data of around 157,000 customers in October 2015.
The ICO found from its investigation that TalkTalk hosted three webpages that were vulnerable to SQL injections.
As Rik Ferguson, Global VP of Security Research at Trend Micro, said at IP Expo, this type of attack should “not be possible in 2016.”
It is possible that Yahoo fell victim to some incredibly sophisticated attack or was left vulnerable by an inept third party; if the attacker really was a nation state then perhaps there was nothing Yahoo could do.
But if, like TalkTalk, Yahoo failed to take basic defensive steps, the repercussions of the attack could be far from over.
As the introduction dates of new data protection regulations such as GDPR approach, companies will increasingly need to address both the before and after of breaches.
It may take some time to know how hackers got into Yahoo’s network and there is no real information on how well-prepared Yahoo was.
The best way to avoid having to deal with the fall-out of a breach is to avoid having one, which basic cyber security prevention steps could go a long way towards.
But even if the attack was unavoidable, if Yahoo did have the basics in place, at least the company won’t need to feel too fearful of the results of the investigation.
This article is from the CBROnline archive: some formatting and images may not be present.
Join Our Newsletter
Want more on technology leadership?
Sign up for Tech Monitor's weekly newsletter, Changelog, for the latest insight and analysis delivered straight to your inbox.