Was your Yahoo account among the 3 billion struck by multiple data breaches between 2013 and 2016? You might be eligible for a $358 payout or two years of free credit monitoring.
If the settlement is approved by California courts, Yahoo could divvy up more than $117.5 million among users whose names, email addresses and passwords were stolen.
Eligible users can submit claims at Yahoodatabreachsettlement.com to receive at least two years of free credit monitoring services by AllClear ID.
If consumers can verify that they already use a credit monitoring service that they’ll keep for at least a year, they can submit a claim for $100 instead. The true amount may be more than that – up to $358 – but it will likely be less, depending on how many people submit claims.
What about these breaches?
In 2016, Yahoo disclosed two massive data breaches: One in 2013, when an unauthorized third party stole user data, and another in 2014, the work of a “state-sponsored actor,” the company said.
Sensitive financial data like bank account numbers and credit card information weren’t believed to be stolen in the attack, but emails and passwords were.
Users were urged to immediately change their passwords and security questions – key steps in protecting online accounts from similar attacks.
Who’s eligible to make a claim?
You’re a member of the settlement class if:
- You had a Yahoo account between January 1, 2012 and December 31, 2016
- You received a notice about the data breaches
- You’re a resident of the US or Israel
If you’re eligible, you can submit a claim to receive at least two years of free credit monitoring services or collect $100.
You could earn up to $25,000, too, if you provide proof of out-of-pocket losses or loss of time during the data breaches.
How long will it take to settle?
The approval process could take more than a year. California courts will hear two cases to approve the settlement, with the final fairness hearing in April 2020, and no payments will be made until then.
All claim forms must be filed online or mailed no later than July 20, 2020.



![This photo taken on August 4, 2020 shows Prince, a member of the hacking group Red Hacker Alliance who refused to give his real name, using his computer at their office in Dongguan, China's southern Guangdong province. - From a small, dingy office tucked away in an industrial city in southern China, one of China's last "volunteer hacker" groups maintains a final outpost in its patriotic hacking war. (Photo by NICOLAS ASFOURI / AFP) / TO GO WITH China-hacking-security,FOCUS by Laurie Chen / The erroneous mention[s] appearing in the metadata of this photo by NICOLAS ASFOURI has been modified in AFP systems in the following, we removed the HOLD HOLD HOLD in the main caption. Please immediately remove the erroneous mention[s] from all your online services and delete it (them) from your servers. If you have been authorized by AFP to distribute it (them) to third parties, please ensure that the same actions are carried out by them. Failure to promptly comply with these instructions will entail liability on your part for any continued or post notification usage. Therefore we thank you very much for all your attention and prompt action. We are sorry for the inconvenience this notification may cause and remain at your disposal for any further information you may require. (Photo by NICOLAS ASFOURI/AFP via Getty Images)](https://media.cnn.com/api/v1/images/stellar/prod/210621154549-hackers-keyboard.jpg?q=x_0,y_131,h_1419,w_2523,c_crop/w_250)











