Russian Email Giants Yandex and Mail.Ru Bleed Passwords, Deny Hacking

Why did someone leak millions of Yandex and Mail.Ru email passwords, most of them inactive? Images mixed by Tetyana Lokot.

Why did someone leak millions of Yandex and Mail.Ru email passwords, most of them inactive? Images mixed by Tetyana Lokot.

Russia's largest email services, Yandex and Mail.Ru, were both hit with password leaks recently, resulting in millions of passwords published openly online and heated discussions in Russian web communities. The companies claimed the passwords were obtained through phishing scams on the users’ end rather than hacking attacks on their servers.

Yandex was the first to fall, when Habrahabr.ru, a popular tech and internet news forum, first published news of the password leak. User lagudal said he discovered the file with 1.2 million Yandex email logins and passwords on the Infosliv forum, a traditional leak dump space. Some of the other Habrahabr.ru users investigated the file and found their Yandex account information there, proving the database was at least in part real.

Such a massive password dump inevitably caused a commotion in the RuNet and invited witticisms based on Yandex's search engine slogan, “Найдётся всё” (Anything can be found), like this one from Twitter user Shulz:

Yandex. Anything can be found. Even your Yandex accounts’ passwords.

Editors of Zuckerberg Calling, a Russian website about startup and internet business news, also tested out some of the email login and password pairs and found that in many cases the inboxes were real, but appeared forsaken or inactive. Even so, word quickly got around, and everyone set about to changing their passwords just in case. Helpful netizens set up a website where one could check to see if their Yandex email was among those dumped in the password leak.

Habrahabr.ru user Haoose decided to investigate the security and strength of the leaked passwords and published a ranked list of the most used ones. As is usually the case, the combination “123456” was at the top of the list, found in the database 37,821 times, and followed by security gems “123456789” and “111111”. Average email users, it seems, never change.

Speculation was rife about a hacker attack on Yandex servers or an internal leak, when Yandex's press-service finally denied any instances of hacking or leaking. Yandex confirmed that active account passwords only made up 15% of the published database, and the remaining 85% were inactive accounts, which had not responded to earlier password reset notifications sent out by the tech staff.

The active account information and passwords in the published database, Yandex said, were compromised by the users themselves, either as a result of virus attacks or phishing scams, and Yandex had launched verification procedures for these accounts. Yandex also insisted they never store passwords in plaintext, and use the necessary precautions for encrypting them.

Мы не храним пароли открытым текстом, никогда не передаём их по сети открытым текстом и не открываем их любым третьим лицам. Более того, большинство из этих паролей слишком простые, и сейчас их даже установить не получилось бы.

We don’t store the passwords in cleartext (plaintext), we never transmit them on the Internet in cleartext and don’t open them up to third parties. Moreover, the majority of these passwords are too simple, and could not even be used [by our email subscribers] now.

Regardless, Yandex did reset the passwords of the 1.2 million compromised accounts, both inactive and active ones. VKontakte also suspended all pages of users who used leaked Yandex emails to register, asking them to change their passwords, VK's press-secretary George Lobushkin said on Twitter.

As a safety precaution, we've frozen all the accounts registered to the compromised Yandex addresses until their owners change their passwords.

The discussion about the Yandex “leak” had hardly died down, when another Habrahabr.ru user polym0rph found a different database with 4,5 million Mail.ru logins and passwords, published on the Bitcoin Security forum. Mail.ru analysed the database and concluded that 95% of the leaked accounts had been flagged as compromised previously, asked to change their passwords, and were restricted from sending emails or inactive. The overall context of the “leaked” database and the seemingly huge numbers of compromised accounts seemed suspiciously like the Yandex incident, which took place only hours before.

The almost simultaneous publication of two big password databases raises questions, but the arguments of Yandex and Mail.ru in reaction to the security scare seem valid: you don’t have to be a sophisticated hacker to crack a password like “123456,” and you don't have to hack the system, just hijack a few passwords.

In spite of these convincing arguments, some experts don't believe that the users’ data leaked out entirely through a fault of their own. The amount of stolen passwords seems too large to be collected by means of viruses and fishing, Andrey Zerenkov, senior information security consultant at Semantic, told Vedomosti.

Zerenkov acknowledged that such a massive dataset could be gathered manually over a period of several years, which does not explain why it was leaked at this particular moment.

Разумеется, этот список мог составляться не один год и даже группой лиц, но тогда непонятен мотив появления этих данных. Обычно подобные публикации — это результат утечки, а не долгой и кропотливой работы с какой-то скрытой целью, чаще всего криминального характера.

Of course, this list could have been put together over a few years and by a group of people even, but then the motive of publishing this data is unclear. Usually such publications are a result of leaks, and not of long and arduous labor with a concealed purpose, usually of a criminal nature.

According to IT entrepreneur Anton Nossik, there could be several reasons for laying this data open to the public all at once. He supposes one reason might be that the Russian government is trying to prime public opinion for a new Internet law. The law in question might be an initiative about storing personal data (like the well-known data servers law) or a directive about a government-owned mail service.

While Nossik's conjectures are pure speculation, the Kremlin does enjoy skewing public opinion on matters of importance, and is quite good at it. Knowing how prolific Russian lawmakers have been lately on Internet-related matters, we only have to wait a little bit to find out.

12 comments

  • JOHN JACKSON

    this is the king base out of the u.s.c here in usa article 1 section 9 title of nobility of present king please read such i am history none never claim civil rights please look at the pic its me im black 39 a man born in milwaukee wisconsin 53208 area johnkingred1975@gmail.com 1-414-595-4513 here in usa i am looking for a few good men and woman to start my militia which is my civil right to protect my free state/self crownkingdom which i yet built due to looking for a safe land to build such.i want the world to know i kingjohnjermainejackson is also the commonlaw judge and the need for a passport is no need to enter or leave a country or etc etc . please hold no grounds on me for what us/states/usa done unto you if at all they did because i am king not of past kings nor past harm any may have done or do to this day i as king is trying to clean up the harm unto the u.s.c that made me the most powerful man/king in history world wide via copyrights own/seize worldwide due to copyrights broke and made money off such. all is sent under common laws/civil also this memo is for any country to read and apply for my arm force also i would allow for those to be base here as ones to protect their common wealth here as well . i talk to the air force here today and it is clear that i am to recive respect unlimited due to their oath unto the u.s.c

  • Max Butler

    Hire from Haxxor for all forms of hacking. PROOF of access before any payment is made. Spy on cheating spouses (emails and mobile phone)/ Change grades/ Clear criminal records/ Public and private databases/ Private investigations/ All forms of social media hacks (Instagram/twitter/facebook etc)…
    Contact- el.haxxor@gmail.com or Text +1(917) 423-4894

    Web: http://elhaxxor.wix.com/elhaxxor

Join the conversation

Authors, please log in »

Guidelines

  • All comments are reviewed by a moderator. Do not submit your comment more than once or it may be identified as spam.
  • Please treat others with respect. Comments containing hate speech, obscenity, and personal attacks will not be approved.