Patch: Statement
Patch: Statement
Patch: Statement
The vulnerability that caused the breach was vulnerability Apache Struts CVE-2017-
5638. Apache Struts is a popular framework for creating Java Web applications
maintained by the Apache Software Foundation. The Foundation issued
a statement announcing the vulnerability and released a patch on March 7, 2017.
The vulnerability was left unpatched until July 29, 2017 when Equifax’s information
security department discovered “suspicious network traffic” associated with its online
dispute portal and applied the Apache patch. On July 30, 2017, Equifax observed
further suspicious activity and took the web application offline. Three days letter the
company hired cybersecurity firm Mandiant to conduct a forensic investigation of the
breach. The investigation revealed that the data of an additional 2.5 million U.S.
consumers had been breached, bringing the total number of Americans affected to
approximately 145.5 million. Equifax disclosed in the same announcement that 8,000
Canadians had been impacted and stated that the forensic investigation related to
UK consumers had been completed, but did not state the amount of UK consumers
affected. A later announcement from Equifax stated that the data of 693,665 UK
citizens was breached.
Equifax’s response to the breach raised concerns among security experts and
consumer advocates. Security expert Brian Krebs called Equifax’s public outreach
after the breach “haphazard,” ill-conceived,” and a “dumpster fire.” Equifax created a
separate domain—equifaxsecurity2017.com—for consumers to find out if their
information was compromised in the breach. This caused the site to be flagged as a
phishing threat by browsers. Developer Nick Sweeting bought the domain
securityequifax2017.com to demonstrate that Equifax’s decision to create a separate
domain made it much easier for phishing sites to imitate it and confuse people. The
Equifax Twitter account accidentally tweeted a link of the spoofed site. Consumers
who contacted Equifax in the immediate wake of the breach to freeze their credit
were given PINs that corresponded to the date and time of the freeze, making them
easier to guess.
Equifax advised people to sign up for their credit monitoring service TrustedID
Premiere, but in doing so consumers agreed to terms of use with a mandatory
arbitration clause. After public outcry that Equifax was forcing consumers to give up
their right to sue, the company issued a press release explaining that the arbitration
clause would not apply to claims arising from the security breach.
Timeline
At any rate, once the breach was publicized, Equifax's immediate response did
not win many plaudits. Among their stumbles was setting up a separate dedicated
domain, equifaxsecurity2017.com, to host the site with information and resources
for those potentially affected. These sorts of lookalike domains are often used
by phishing scams, so asking customers to trust this one was a monumental
failure in infosec procedure. Worse, on multiple occasions official Equifax social
media accounts erroneously directed people to securityequifax2017.com instead;
fortunately, the person who had snapped up that URL used it for good, directing
the 200,000 (!) visitors it received to the correct site .
The Equifax settlement dangles the prospect that you might get a check for your
troubles, but there are some catches. The settlement mandates that Equifax
compensate anyone affected by the breach with credit monitoring services;
Equifax wants you to sign up for their own service, of course, and while they will
also give you a $125 check to go buy those services from somewhere else, you
have to show that you do have alternate coverage to get the money (though you
could sign up for a free service).
More cash is available if you've actually lost money from identity theft or
spent significant amounts of time dealing with the fallout, but here, too,
documentation is required. And that $125 is just a maximum; it almost
certainly will go down if too many people request checks .
Attackers
breach occurred, meaning that encrypted traffic was not being inspected
throughout that period. As a result, during that period, the attacker was
system commands being executed in ways that were not part of normal
Equifax reported that, on July 30, 2017, after its information security
the online dispute portal was taken offline. The next day, the Chief
Cybersecurity Controls
and its notice of 2018 annual meeting and proxy statement, following the
responsible for coordinating the response to the incident stated that, once
the company identified how the attackers were able to gain unauthorized
to address the internal factors that led to the breach. The measures were
measures were implemented to address the factors that led to the breach.
officials said they have developed new policies to protect data and
Individuals
Following the shutdown of its online dispute portal, Equifax took steps to
identify what data had been lost and the number of individuals affected so
on a separate system that could run the queries at high speed, allowing
Equifax to generate its estimate in a relatively short period of time.
Equifax staff then worked to reconstruct queries against the data tables to
sets included information that could be matched to more than one known
these data sets with information in the company’s internal databases that
were not impacted by the data breach to make matches with known
identities.
For example, Equifax took partial records that did not include all fields
breach.
not all of the types of PII had been compromised for all affected
individuals.
disputes they filed about the accuracy of their credit reports, such as
utility bills.
incorrectly concluded that one of the attackers’ queries had not returned
query had, in fact, allowed the attackers to access PII from approximately
because their names and partial driver’s license information were not
officials, some of the individuals within this group of 2.4 million were
while others were not. As of August 2018, Equifax had not determined
Monitoring Services
affected residents in each state and its plans for consumer remediation.
were affected by the breach and to help protect against misuse of their
public providing information about the breach and the types of PII that
Further, the press release issued on September 7, 2017, stated that the
consumers determine if they were impacted and expanded its call center
compromised, free of charge for one year. Those services included credit
from identity theft, and a Social Security number monitoring service that
number.
January 31, 2018, when Equifax announced a new service called “Lock &
Alert.” This new service allows consumers to use their smartphone or
no cost.
On September 15, Equifax released a statement announcing the immediate departures and
replacements of its Chief Information Officer and Chief Security Officer. [10][43] The statement
included bullet-point details of the intrusion, its potential consequences for consumers, and
the company's response. The company said had hired cybersecurity firm Mandiant on
August 2 to investigate the intrusion internally. The statement did not specify when U.S.
government authorities were notified of the breach, although it did assert "the company
continues to work closely with the FBI in its investigation".
Equifax agreed to pay $700 million to settle federal and state investigations into
how it handled a massive data breach that affected nearly 150 million people, about
56% of Americans.
Starting next year, you can request up to six additional free credit reports per year
from Equifax through 2027. This is in addition to the one free credit report from
each credit bureau — Equifax, Experian and Transunion — that all Americans can
request annually.
Additionally, the settlement allows for seven years of free assisted identity
restoration service to help you fix any fraud or identity theft issues caused by the
breach.
"This company's ineptitude, negligence, and lax security standards endangered the
identities of half the U.S. population," New York Attorney General Letitia
James said in a statement Monday. "Now it's time for the company to do what's
right and not only pay restitution to the millions of victims of their data breach, but
also provide every American who had their highly sensitive information accessed
with the tools they need to battle identity theft in the future."
Systems monitoring is a priority because the data breach stemmed from Equifax's
security team failing to patch a vulnerability in Apache Struts even after it had been
warned and conducted a search. This allowed threat actors to have access to the
company’s network for several months.
"We've applied educational best practices so that they get immediate feedback in
terms of what they did right and what they did wrong," Farshchi says. "We put a
positive spin on it; we try not to be negative and the downer all the time." The
scorecard supplies immediate feedback on what a staff member should do and how
they can do better.
Equifax's bungles kicked off quite literally on day one, when the
company directed potential victims to a separate domain—
equifaxsecurity2017.com—instead of simply building pages to
handle the breach off of its main, trusted website, equifax.com.
Observers quickly found bugs, some of them serious, in that breach-
response site. All the while, Equifax asked people to trust the
security of the site, and to submit the last six digits of their Social
Security number as a way of checking whether their information had
been potentially compromised in the breach.
It’s going to be more difficult to convince people that they can now
safeguard data, because Equifax has undermined their credibility from the
way they’ve responded. They made the situation worse."
In the weeks since Equifax disclosed the breach, the company's official
Twitter account has mistakenly tweeted a phishing link four times, instead
of the company's actual breach response page. Lucky for Equifax, the
page isn't actually malicious. Developer Nick Sweeting set up
securityequifax2017.com—versus the legitimate equifaxsecurity2017.com
—to show how easy the site is to spoof, and how ill-advised it was for
Equifax to break it away from its main corporate domain. But if it hadn't
been a proof-of-conept, the phish Equifax inadvertently promoted could
have done a lot of harm. Sweeting says the fake site has had roughly
200,000 page loads.
The accumulation of missteps, slow disclosure, and problematic public
response with so many millions of innocent consumers potentially affected
deeply troubles security practitioners. "These are all indicators of a
company that had a horrible security culture," says Tinfoil Security's
Borohovski. "Unfortunately, the only word for it is negligence." And the
more recent mistakes join a list of other revelations that Equifax had a
disorganized approach to security, and a naiveté about the possibility of a
breach. The fact that attackers got into Equifax's systems through a
known vulnerability with a patch available galls security analysts. But the
company also acknowledged that it knew about the patch when it was first
released, and had actually attempted to apply it to all its systems. This
inadequate effort hints at the truly haphazard nature of Equifax's
operation. There’s no question a company like Equifax would be targeted
all the time [by hackers] and that's hard, but all of this really speaks to
poor security practices and a lackadaisical response," Casaba Security's
Glassberg says.
If you have credit monitoring that will continue for at least 6 months and you decide not to
enroll in the free credit monitoring offered in the settlement, you may be eligible for a cash
payment. The amount you’d get will depend on the number of claims filed.
The Court gave final approval to the Settlement and overruled all objections on
January 13, 2020. However, some objectors have now appealed the Court’s decision to
approve the Settlement.
The Appellate Court recently entered an order providing that oral argument on the
objectors’ appeals will take place in April 2021. Unfortunately, we do not know when
the appellate court will issue a ruling on the settlement after hearing oral argument. By
order of the Court, the Settlement cannot become final until the appeals of the
remaining six objectors are resolved.
If you are a class member, the deadline to file Initial Claims Period claim(s) for free
credit monitoring or up to $125 cash payment and other cash reimbursement passed
on January 22, 2020.
Please note that no Settlement benefits will be distributed or available until the Settlement
becomes effective. The Settlement will become effective after all appeals have been
resolved in favor of the Settlement. If you requested a cash benefit during the Initial
Claims Period, the amount you receive may be significantly reduced depending on
how many valid claims are submitted by other class members. Based on the number
of potentially valid claims that have been submitted to date, payments for time spent
and alternative compensation of up to $125 likely will be substantially lowered and
will be distributed on a proportional basis if the Settlement becomes effective.
Depending on the number of valid claims filed, the amount you receive may be a
small percentage of your initial claim.
If you were impacted by the Equifax data breach, you may seek reimbursement for
valid Out of Pocket losses or Time Spent (excluding losses of money and time
associated with freezing or unfreezing credit reports or purchasing credit monitoring
or identity theft protection) incurred during the Extended Claims Period if you have
not received reimbursement for the claimed loss through other means.
Time Spent during the Extended Claims Period recovering from fraud, identity
theft, or other misuse of your personal information caused by the data breach
up to 20 total hours at $25 per hour.
In order to submit a claim for Time Spent or Out-of-Pocket Losses during the
Extended Claims Period, you must certify that you have not received reimbursement
for the claimed loss through other means.
Free Identity Restoration Services: When the Settlement becomes effective, you will be
eligible for at least 7 years of free assisted identity restoration services to help you remedy
the effects of identity theft and fraud.
Do nothing
If you do nothing, you can still
access Identity Restoration
Services, but will not be entitled to
any other benefits provided under
the Settlement. If the Settlement
becomes effective, you will give
up your rights to sue Equifax
separately for claims relating to
the Data Breach or to continue to
pursue any such claims you have
already filed.