Английская Википедия:2017 Equifax data breach

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Шаблон:Short description Шаблон:Use mdy dates The Equifax data breach occurred between May and July 2017 at the American credit bureau Equifax. Private records of 147.9 million Americans along with 15.2 million British citizens and about 19,000 Canadian citizens were compromised in the breach, making it one of the largest cybercrimes related to identity theft. In a settlement with the United States Federal Trade Commission, Equifax offered affected users settlement funds and free credit monitoring.

In February 2020, the United States government indicted members of China's People's Liberation Army for hacking into Equifax and plundering sensitive data as part of a massive heist that also included stealing trade secrets, though the Chinese Communist Party denied these claims.[1][2]

Data breach

A key security patch for Apache Struts was released on March 7, 2017 after a security exploit was found and all users of the framework were urged to update immediately.[3] Security experts found an unknown hacking group trying to find websites that had failed to update Struts as early as March 10, 2017 as to find a system to exploit.[4]

As determined through postmortem analysis, the breach at Equifax started on May 12, 2017 when Equifax had yet to update its credit dispute website with the new version of Struts.[5][6] The hackers used the exploit to gain access to internal servers on Equifax' corporate network. The information first pulled by the hackers included internal credentials for Equifax employees, which then allowed the hackers to search the credit monitoring databases under the guise of an authorized user. Using encryption to further mask their searches, the hackers performed more than 9000 scans of the databases, extracted information into small temporary archives that were then transferred off the Equifax servers to avoid detection and removed the temporary archives once complete.[7] The activities went on for 76 days until July 29, 2017 when Equifax discovered the breach[8][9][10] and subsequently, by July 30, 2017, shut off the exploit.[4] At least 34 servers in twenty different countries were used at different points during the breach, making tracking the perpetrators difficult.[7] While the failure to update Struts was a key failure, analysis of the breach found further faults in Equifax' system that made it easy for the breach to occur, including the insecure network design which lacked sufficient segmentation,[11] potentially inadequate encryption of personally identifiable information (PII),[12] and ineffective breach detection mechanisms.[13]

Information accessed in the breach included first and last names, Social Security numbers, birth dates, addresses and, in some instances, driver's license numbers for an estimated 143 million Americans, based on Equifax' analysis.[9] Information on an estimated range of under 400,000 up to 44 million British residents as well as 8,000 Canadian residents were also compromised.[14][15][16][17][18] An additional 11,670 Canadians were affected as well, later revealed by Equifax.[19] Credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personally identifiable information for approximately 182,000 U.S. consumers were also accessed.[20][10]

Since the initial disclosure in September 2017, Equifax expanded the number of records they discovered were accessed. In both October 2017 and March 2018, Equifax reported that an additional 2.5 and 2.4 million American consumer records were accessed, respectively, bringing the total to 147.9 million.[21][22] Equifax narrowed its estimate for UK consumers affected by the breach to 15.2 million in October 2017,[23][24] of which 693,665 had sensitive personal data disclosed.[25][26][23][27][24] Equifax also estimated that the number of drivers' licenses breached in the attack to be 10-11 million.[28][29][30]

Security experts expected that the lucrative private data from the breach would be turned around and sold on black markets and the dark web, though as of May 2021, there has been no sign of any sale of this data.[1] Because the data did not immediately show up in the first 17 months following the breach, security experts theorized that either the hackers behind the breach were waiting for a significant amount of time before selling the information since it would be too "hot" to sell that close to the breach, or that a nation-state was behind the breach and planning on using the data in a non-financial manner such as for espionage.[31]

Disclosure and short-term responses

On September 7, 2017, Equifax disclosed the breach and its scope: affecting over 140 million Americans.[32] VentureBeat called the exposure of data on 140+ million customers "one of the biggest data breaches in history."[33] Equifax shares dropped 13% in early trading the day after the breach was made public.[34] Numerous media outlets advised consumers to request a credit freeze to reduce the impact of the breach.[35][36][37][38]

On September 10, 2017, three days after Equifax revealed the breach, Congressman Barry Loudermilk (R-GA), who had been given two thousand dollars in campaign funding from Equifax,[39][40] introduced a bill to the U.S. House of Representatives that would reduce consumer protections in relation to the nation's credit bureaus, including capping potential damages in a class action suit to $500,000 regardless of class size or amount of loss.[41] The bill would also eliminate all punitive damages.[41][42] Following criticism by consumer advocates, Loudermilk agreed to delay consideration of the bill "pending a full and complete investigation into the Equifax breach".[41]

On September 15, Equifax released a statement announcing the immediate departures and replacements of its chief information officer and chief security officer.[10][43] The statement included bullet-point details of the intrusion, its potential consequences for consumers, and the company's response. The company said it had hired cybersecurity firm Mandiant on August 2 to investigate the intrusion internally. The statement did not specify when U.S. government authorities were notified of the breach, although it did assert "the company continues to work closely with the FBI in its investigation".[10]

On September 28, new Equifax CEO Paulino do Rego Barros Jr. responded to criticism of Equifax by promising that the company would, from early 2018, allow "all consumers the option of controlling access to their personal credit data", and that this service would be "offered free, for life".[44]

On October 26, Equifax appointed technology executive Scott A. McGregor to its board of directors. In announcing the change, the board's chairman noted McGregor's "extensive data security, cybersecurity, information technology and risk management experience".[45][46] The Wall Street Journal reported that he joined the board's technology committee, which has duties that include oversight of cybersecurity.[47]

Litigation

Numerous lawsuits were filed against Equifax in the days after the disclosure of the breach.[48][49] In one suit the law firm Geragos & Geragos has indicated they would seek up to $70 billion in damages, which would make it the largest class-action suit in U.S. history.[48] Since October 2017, hundreds of consumers have sued Equifax for the data breach, some winning small claims cases in excess of $9,000, including actual damages, future damages, anxiety, monitoring fees and punitive damages.[50]

In September 2017, Richard Cordray, then director of the Consumer Financial Protection Bureau (CFPB), authorized an investigation into the data breach on behalf of affected consumers. However, in November 2017, Mick Mulvaney, President Donald Trump's budget chief, who was appointed by Trump to replace Cordray, was reported by Reuters to have "pulled back" on the probe, along with shelving Cordray's plans for on-the-ground tests of how Equifax protects data. The CFPB also rebuffed bank regulators at the Federal Reserve Bank, Federal Deposit Insurance Corporation and Office of the Comptroller of the Currency who offered to assist with on-site exams of credit bureaus.[51] Senator Elizabeth Warren, who released a report on the Equifax breach in February 2018, criticized Mulvaney's actions, stating: "We're unveiling this report while Mick Mulvaney is killing the consumer agency's probe into the Equifax breach. Mick Mulvaney shoots another middle finger at consumers."[52]

On July 22, 2019, Equifax agreed to a settlement with the Federal Trade Commission (FTC), CFPB, 48 U.S. states, Washington, D.C., and Puerto Rico to alleviate damages to affected individuals and make organizational changes to avoid similar breaches in the future. The total cost of the settlement included $300 million to a fund for victim compensation, $175 million to the states and territories in the agreement, and $100 million to the CFPB in fines.[53] In July 2019, the FTC published information on how affected individuals could file a claim against the victim compensation fund using the website EquifaxBreachSettlement.com.[54]

Perpetrators

The United States Department of Justice announced on February 10, 2020 that they had indicted four members of China's military on nine charges related to the hack, though there has been no additional evidence that China has since used the data from the hack.[55][56][57] The Chinese government denied that the four accused had any involvement with the hack.[1]

Criticism

Following the announcement of the May–July 2017 breach, Equifax's actions received widespread criticism. Equifax did not immediately disclose whether PINs and other sensitive information were compromised, nor did it explain the delay between its discovery of the breach in July and its public announcement in early September.[58] Equifax stated that the delay was due to the time needed to determine the scope of the intrusion and the large amount of personal data involved.[59]

It was also revealed that three Equifax executives sold almost $1.8 million of their personal holdings of company shares days after Equifax discovered the breach but more than a month before the breach was made public.[60] The company said the executives, including the chief financial officer John Gamble,[61][34] "had no knowledge that an intrusion had occurred at the time they sold their shares".[62] On September 18, Bloomberg reported that the U.S. Justice Department had opened an investigation to determine whether or not insider trading laws had been violated.[63] "As Bloomberg notes, these transactions were not pre-scheduled trades and they took place on August 2, three days after the company learned of the hack".

When publicly revealing the intrusion to its systems, Equifax offered a website (https://www.equifaxsecurity2017.com[64]) for consumers to learn whether they were victims of the breach. Security experts quickly noted that the website had many traits in common with a phishing website: it was not hosted on a domain registered to Equifax, it had a flawed TLS implementation, and it ran on WordPress which is not generally considered suitable for high-security applications. These issues led Open DNS to classify it as a phishing site and block access.[65] Moreover, members of the public wanting to use the Equifax website to learn if their data had been compromised had to provide a last name and six digits of their social security number.[66]

The website set up to check whether a person's personal data had been breached (trustedidpremier.com) was determined by security experts and others to return apparently random results instead of accurate information.[66] As with https://www.equifaxsecurity2017.com, this website, too, was registered and constructed like a phishing website, and it was flagged as such by several web browsers.[67]

The Trusted ID Premier website contained terms of use, dated September 6, 2017 (the day before Equifax announced the security breach) which included an arbitration clause with a class action waiver.[68][69] Attorneys said that the arbitration clause was ambiguous and that it could require consumers who accepted it to arbitrate claims related to the cybersecurity incident.[69] According to Polly Mosendz and Shahien Nasiripour, "some fear[ed] that simply using an Equifax website to check whether their information was compromised bound them to arbitration".[70] The equifax.com website has separate terms of use with an arbitration clause and class action waiver, but, according to Brian Fung of The Washington Post, "it's unclear if that applies to the credit monitoring program".[71] New York Attorney General Eric Schneiderman demanded that Equifax remove the arbitration clause.[72] Responding to arbitration-related concerns, on September 8, Equifax issued a statement stating that "in response to consumer inquiries, we have made it clear that the arbitration clause and class action waiver included in the Equifax and TrustedID Premier terms of use does not apply to this cybersecurity incident".[72] Joel Winston, a data protection lawyer, argued that the announcement disclaiming the arbitration clause "means nothing" because the terms of use state that they are the "entire agreement" between the parties.[72] The arbitration clause was later removed from equifaxsecurity2017.com,[72] and the equifax.com terms of use were amended on September 12 to state that they do not apply to www.equifaxsecurity2017.com, www.trustedidpremier.com, or www.trustedid.com and to exclude claims arising from those sites or the security breach from arbitration.[73][74]

Responding to continuing public outrage,[75] Equifax announced on September 12, 2017, that they "are waiving all Security Freeze fees for the next 30 days".[76][77]

Equifax has been criticized by security experts for registering a new domain name for the site name instead of using a subdomain of equifax.com. On September 20, 2017, it was reported that Equifax had been mistakenly linking to an unofficial "fake" web site instead of their own breach notification site in at least eight separate tweets, unwittingly helping to direct a reported 200,000 hits to the imitation site. A software engineer named Nick Sweeting created the unauthorized Equifax web site to demonstrate how the official site could easily be confused with a phishing site. Sweeting's site was upfront to visitors that it was not official, however, telling visitors who had entered sensitive information that "you just got bamboozled! this isnt Шаблон:Sic a secure site! Tweet to @equifax to get them to change it to equifax.com before thousands of people loose Шаблон:Sic their info to phishing sites!" Equifax apologized for the "confusion" and deleted the tweets linking to this site.[78][79][80]

See also

References

Шаблон:Reflist

Шаблон:Hacking in the 2010s

  1. 1,0 1,1 1,2 Шаблон:Cite web
  2. Шаблон:Cite web
  3. Шаблон:Cite web
  4. 4,0 4,1 Шаблон:Cite web
  5. Шаблон:Cite web
  6. Шаблон:Cite web
  7. 7,0 7,1 Шаблон:Cite web
  8. Шаблон:Citation
  9. 9,0 9,1 Шаблон:Cite web
  10. 10,0 10,1 10,2 10,3 Шаблон:Cite web
  11. Шаблон:Cite news
  12. Шаблон:Cite news
  13. Шаблон:Cite news
  14. Шаблон:Cite news
  15. Шаблон:Cite web
  16. Шаблон:Cite news
  17. Шаблон:Cite news
  18. Шаблон:Cite news
  19. Шаблон:Cite news
  20. Шаблон:Cite web
  21. Шаблон:Cite web
  22. "Equifax Data Breach Lawsuit", Morgan & Morgan.
  23. 23,0 23,1 Шаблон:Cite news
  24. 24,0 24,1 Шаблон:Cite web
  25. Шаблон:Cite web
  26. Шаблон:Cite web
  27. Шаблон:Cite web
  28. Шаблон:Cite web
  29. Шаблон:Cite web
  30. Шаблон:Cite web
  31. Шаблон:Cite web
  32. Шаблон:Cite web
  33. "The end of the cloud is coming", VentureBeat, Victor Charypar, November 4, 2017
  34. 34,0 34,1 Шаблон:Cite news
  35. Шаблон:Cite web
  36. Шаблон:Cite news
  37. Шаблон:Cite news
  38. Шаблон:Cite news
  39. Шаблон:Cite web
  40. Шаблон:Cite web
  41. 41,0 41,1 41,2 Weisbaum, Herb, “Republicans in Congress Want to Roll Back Regulations on Credit Bureaus”, NBC News, September 11, 2017, Retrieved September 18, 2017
  42. Шаблон:Cite news
  43. Шаблон:Cite news
  44. Шаблон:Cite web
  45. Шаблон:Cite press release
  46. Шаблон:Cite web
  47. Шаблон:Cite news
  48. 48,0 48,1 Шаблон:Cite news
  49. Шаблон:Cite news
  50. Шаблон:Cite web
  51. Patrick Rucker, “U.S. consumer protection official puts Equifax probe on ice”, Reuters, February 5, 2018, Retrieved February 16, 2018
  52. Шаблон:Cite news
  53. Шаблон:Cite web
  54. Шаблон:Cite web
  55. Шаблон:Cite web
  56. Шаблон:Cite web
  57. Шаблон:Cite web
  58. Шаблон:Cite web
  59. Шаблон:Cite web
  60. Шаблон:Cite news
  61. Шаблон:Cite news.
  62. Шаблон:Cite news
  63. Шаблон:Cite news
  64. Шаблон:Cite news
  65. Шаблон:Cite news
  66. 66,0 66,1 Шаблон:Cite web
  67. Шаблон:Cite news
  68. Шаблон:Cite web
  69. 69,0 69,1 Шаблон:Cite web
  70. Шаблон:Cite news
  71. Шаблон:Cite web
  72. 72,0 72,1 72,2 72,3 Шаблон:Cite web
  73. Шаблон:Cite web
  74. Шаблон:Cite web
  75. Шаблон:Cite web
  76. Шаблон:Cite web
  77. Шаблон:Cite web
  78. Шаблон:Cite news
  79. Шаблон:Cite web
  80. Шаблон:Cite news