Story image

2017 Equifax breach: Impact and lessons learned

02 Oct 2017

By Rick Holland, VP Strategy at Digital Shadows

Equifax experienced a data breach that occurred in mid-May 2017, was first discovered on 29 July 2017, and was publicly disclosed by the company on 07 September 2017.

The breach affected 143 million individuals in the United States, Canada and the United Kingdom. Immediately after the disclosure Equifax faced widespread criticism from the media, researchers and customers. There have also been allegations of insider trading and legal implications.

In our paper Equifax Breach: Lessons Learned for Your Organisations, we outline how the events surrounding the breach demonstrate several important learning points organisations can use to inform their own security posture.

The largest immediate impact to Equifax was loss of investor confidence; the share price dropped 34 percent within eight days after the breach disclosure. The company also risks revenue loss resulting from reduced business, especially considering customers’ loss of confidence in the company to secure data. As with all data breaches, Equifax will also incur financial losses through its responsive investigations and, likely, costs resulting from lawsuits.

Swift public criticism followed around Equifax’s security posture, its handling of the breach and the exposure of the sensitive customer data. Some employees have been accused of insider trading, and others have reportedly left their positions, such as the chief security officer and chief information officer. Reputational damage may have a mid- to long-term effect on the company’s revenue generation and a prolonged impact on its finances.

The key lessons organisations can learn from this event are:

Maintain an external view of your digital footprint to be aware of what an attacker can access, what is vulnerable to attack and what methods attackers are using against your sector.

Establish and maintain a threat intelligence program, and act on the intelligence; Digital Shadows provided clients with multiple alerts about exploitation of the vulnerability that affected Equifax, prior to the intrusion.

Implement and follow general cyber-security good practice measures, such as defence-in-depth and including vulnerability management. Plan as if an attacker will compromise your network and ensure your sensitive information will be protected.

Assume a breach will occur and plan for this outcome. Ensure people, processes and strategy are in place in advance of it.

Control knowledge of a breach to trusted individuals and prepare for announcements by analysing the possible consequences of decisions.

Communicate clearly when a breach happens, stating the knowns and unknowns publicly. Speculation from media and researchers can damage reputation.

Look for your compromised data online, to try to discern the attacker’s motive. Understanding whether the motive was financial gain may help mitigate against prolonged malicious activity.

Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.