Equifax Intrusion Summary

1053 Words3 Pages

Intrusion Summary
In the early September 2017, a major data breach was announced at Equifax, one of the big three American companies in charge of credit monitoring and calculating credit sources that determine how hard it is for their customers to qualify for a loan application for example. The instruction has caused the loss of staggering amount of personally identifiable information (PII), including Social Security Numbers (SSNs), names, birth dates, addresses, and driver’s license numbers and credit card information. Approximately 143 million U.S. consumers as well as residents in UK and Canada who directly or indirectly use their services have reportedly been impacted by this incident (Fox-Brewster par.2).
The hack stemmed from a flaw in …show more content…

The first few penetrations by an initial group were not so successful until a sophisticated team took over, according to the Moloch, a black box like machine, which kept a record of the network traffic. The hackers were believed to come from China, given that the tools found in the breach were similar to the hacking tools used in the U.S. Office of Personnel Management (OPM). On March 14, an advisory on the vulnerability was published by the United States Computer Emergency Readiness Team, US-CERT, in the Department of Homeland (DHS). During the time, Equifax was told by Mandiant, a security consulting firm about its unpatched systems and potential problem, but the company did not listen; instead, they felt everything was under control. The intruders quickly stalled multiple web shells, essentially a back door, in case ones were found, once they were in the network. Finally, they cracked down one database and they began moving bilaterally across the network, targeting one after the other. At this point, a patch would not sufficiently solve the issue as an internal door was open.
From May to July, the data stolen was so big that the hackers would need to break them into small batch to avoid alarms. Furthermore, the hackers even started download tax forms to file tax returns and steal refunds using stolen PII. During this period, several key security managers left the company. …show more content…

Apache Struts is a framework for developing Java-based applications that run both frontend and backend Web servers. Equifax uses this open-source web application to allow customers interaction. It was established that Apache Struts had a potential vulnerable plugin. Whenever a customer interacts with the system, this plug pulls information from a library program called XStream which converts data into a XML Java code. The hackers inserted their own meticulous codes into Java objects and manipulated the Equifax server running XStream (Bomey, Dastagir, Shell, par. 3).Also, in order to gain persistent access, the hackers added a binary to the boot-up routine so that the executable runs and the firewall service is disabled whenever the system boots (Khandelwal, par. 5). Even though, the flaw in the Apache Strut was the main method used by the hackers to get access into Equifax, there were various other weak security measures that lead to the compromise of the personal data of 143 million individuals. Once the hackers were in the Equifax network, due to the lack of user access and authorization controls, the hackers were able to access the database by the mere use of the password “admin” and username that comprised of first name initial and last name of the employee (Kerner, par. 6). Having access to one privileged user, gave the hackers the ability to create

Open Document