SlideShare a Scribd company logo
1 of 1
Download to read offline
In May 2017, it was revealed that Equifax has joined other high-profile companies including
Marriott, Home Depot Inc., Target Corporation, Anthem, Blue Cross, and Yahoo! as a victim of
cyberattacks. Equifax is one of the largest credit-rating companies in the United States and
operates or has investments in 24 countries and employs over 11,000 employees worldwide.
Hackers gained access to the Equifax network in mid-May 2017 and attacked the company for
76 days. In July 29, 2017, Equifax staff discovered the intrusion during routine checks of the
operating status and configuration of IT systems. This was 76 days after the initial attack.
Hackers accessed Social Security numbers, dates of birth, home addresses, and some driver's
license numbers and credit card numbers, which impacted over 148 million people. The security
system at the company did not keep up with the aggressive company growth and the company
failed to modernize its security system. According to the report the company did not take action
to address vulnerabilities that it was aware of prior to the attack. According to Equifax, hackers
exploited a software vulnerability known as Apache Struts CVE-2017-5638. This vulnerability
was disclosed back in March 2017. There were clear and simple instructions of how to fix the
problem from the software provider Apache. It was the responsibility of Equifax to follow the
recommendations offered by Apache right away. According to Apache, software patches were
made available in March two months before hackers began accessing Equifax data. In addition to
the previously mentioned vulnerability, the hackers found a file containing unencrypted
usernames and passwords. Hackers also found an expired security certificate on a device for
monitoring network traffic. This indicated that Equifax did not detect that data was being stolen.
The Government Accountability Office (GAO) report indicated that the hack took place because
Equifax failed to segment its databases into smaller networks. This, in turn, allowed the attackers
a direct and easy access to all of its customers data. As part of fixing the security issues the
company hired a new chief information security officer, Jamil Farshchi, and has invested $200
million on data security infrastructure.
Question:
What did Apache Struts have to do with this high profile hack of Equifax?
Think of other companies that recently dealt with the same issue (Target, Mastercard, Yahoo) -
what digital marketing efforts do/should companies make to regain customer trust and online
sales?

More Related Content

Similar to In May 2017, it was revealed that Equifax has joined other high-prof.pdf

Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
post_it
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
acarolyn
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
audeleypearl
 

Similar to In May 2017, it was revealed that Equifax has joined other high-prof.pdf (20)

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directors
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security Companies
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 

More from iysh2

Only prepare the journal entries for transactions 1- 15. No Financia.pdf
Only prepare the journal entries for transactions 1- 15. No Financia.pdfOnly prepare the journal entries for transactions 1- 15. No Financia.pdf
Only prepare the journal entries for transactions 1- 15. No Financia.pdf
iysh2
 
Louis files as a single taxpayer. In April of this year he received .pdf
Louis files as a single taxpayer. In April of this year he received .pdfLouis files as a single taxpayer. In April of this year he received .pdf
Louis files as a single taxpayer. In April of this year he received .pdf
iysh2
 
International Accounting Standards (IAS) Fill in the BlanksI.pdf
International Accounting Standards (IAS) Fill in the BlanksI.pdfInternational Accounting Standards (IAS) Fill in the BlanksI.pdf
International Accounting Standards (IAS) Fill in the BlanksI.pdf
iysh2
 

More from iysh2 (6)

Only prepare the journal entries for transactions 1- 15. No Financia.pdf
Only prepare the journal entries for transactions 1- 15. No Financia.pdfOnly prepare the journal entries for transactions 1- 15. No Financia.pdf
Only prepare the journal entries for transactions 1- 15. No Financia.pdf
 
Match the audit procedure with the corresponding Management Assertio.pdf
Match the audit procedure with the corresponding Management Assertio.pdfMatch the audit procedure with the corresponding Management Assertio.pdf
Match the audit procedure with the corresponding Management Assertio.pdf
 
Marc and Mikkel are married and file a joint tax return. Marc and Mi.pdf
Marc and Mikkel are married and file a joint tax return. Marc and Mi.pdfMarc and Mikkel are married and file a joint tax return. Marc and Mi.pdf
Marc and Mikkel are married and file a joint tax return. Marc and Mi.pdf
 
Louis files as a single taxpayer. In April of this year he received .pdf
Louis files as a single taxpayer. In April of this year he received .pdfLouis files as a single taxpayer. In April of this year he received .pdf
Louis files as a single taxpayer. In April of this year he received .pdf
 
International Accounting Standards (IAS) Fill in the BlanksI.pdf
International Accounting Standards (IAS) Fill in the BlanksI.pdfInternational Accounting Standards (IAS) Fill in the BlanksI.pdf
International Accounting Standards (IAS) Fill in the BlanksI.pdf
 
Identify each account type as being associated with the balance shee.pdf
Identify each account type as being associated with the balance shee.pdfIdentify each account type as being associated with the balance shee.pdf
Identify each account type as being associated with the balance shee.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 

In May 2017, it was revealed that Equifax has joined other high-prof.pdf

  • 1. In May 2017, it was revealed that Equifax has joined other high-profile companies including Marriott, Home Depot Inc., Target Corporation, Anthem, Blue Cross, and Yahoo! as a victim of cyberattacks. Equifax is one of the largest credit-rating companies in the United States and operates or has investments in 24 countries and employs over 11,000 employees worldwide. Hackers gained access to the Equifax network in mid-May 2017 and attacked the company for 76 days. In July 29, 2017, Equifax staff discovered the intrusion during routine checks of the operating status and configuration of IT systems. This was 76 days after the initial attack. Hackers accessed Social Security numbers, dates of birth, home addresses, and some driver's license numbers and credit card numbers, which impacted over 148 million people. The security system at the company did not keep up with the aggressive company growth and the company failed to modernize its security system. According to the report the company did not take action to address vulnerabilities that it was aware of prior to the attack. According to Equifax, hackers exploited a software vulnerability known as Apache Struts CVE-2017-5638. This vulnerability was disclosed back in March 2017. There were clear and simple instructions of how to fix the problem from the software provider Apache. It was the responsibility of Equifax to follow the recommendations offered by Apache right away. According to Apache, software patches were made available in March two months before hackers began accessing Equifax data. In addition to the previously mentioned vulnerability, the hackers found a file containing unencrypted usernames and passwords. Hackers also found an expired security certificate on a device for monitoring network traffic. This indicated that Equifax did not detect that data was being stolen. The Government Accountability Office (GAO) report indicated that the hack took place because Equifax failed to segment its databases into smaller networks. This, in turn, allowed the attackers a direct and easy access to all of its customers data. As part of fixing the security issues the company hired a new chief information security officer, Jamil Farshchi, and has invested $200 million on data security infrastructure. Question: What did Apache Struts have to do with this high profile hack of Equifax? Think of other companies that recently dealt with the same issue (Target, Mastercard, Yahoo) - what digital marketing efforts do/should companies make to regain customer trust and online sales?