Lessons Learned from Equifax breach: Crucial hack attack facts
By Alastair Paterson, CEO and Co-Founder, Digital Shadows
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
How prepared is your organization if you were similarly targeted?
As we all know, the impact of the Equifax breach is widespread, potentially affecting 143 million individuals in the U.S., Canada and the UK whose personally identifiable information (PII) and (to some extent) financial information was accessed by malicious actors. The exact impact is yet to be seen and depends on the motives of the attackers and the ways in which they plan to use the data, but any exposure puts individuals at risk.
We’ve also seen tremendous impact on the company as a result of the breach, including a dramatic drop in share price, reputational damage, and job losses for some senior staff members including the CEO. There’s more to come.
Now is an appropriate time to reflect on the lessons we can learn before, during and after discovering a breach to address gaps in processes and technologies and help prevent, detect and mitigate these types of threats.
Before the breach
Equifax has said that the initial intrusion was through exploitation of a vulnerable Apache Struts web application. It turns out that prior to the intrusion multiple alerts about exploitation of this particular vulnerability were issued and a patch was made available. However even without following recommended patch management programs, implementing other basic security principles could have mitigated the damage.
– Maintain awareness of what an attacker can see regarding your infrastructure, people and processes so you can see potential weaknesses and points of access for attackers.
– Understand what methods attackers are using against your sector so you can proactively protect your valuable digital assets.
– Establish and maintain a threat intelligence program and act on the intelligence.
– Implement and follow general cybersecurity good practice measures, such as defense-in-depth, and include vulnerability and patch management.
– Protect your sensitive information through the use of encryption and network segmentation.
– Educate users on the importance of password hygiene and strong authentication requirements.
– Go a step further and assume a breach will occur and plan for this outcome. Ensure your strategy, people and processes are in place in advance.
Not only did Equifax have to deal with the fallout of the breach itself, but unusual trading activity in Equifax shares have provoked suspicions of insider trading and a criminal investigation. Further, Equifax’s infrastructure to handle customer inquiries proved inadequate and some of the strategies put in place to address customer concerns in the wake of the discovery backfired.
– Control knowledge of a breach to trusted individuals to prevent collateral damage; no matter how swiftly an organization moves there will always be some lapse in time between discovery and disclosure.
– Anticipate fallout and prepare for announcements by analyzing the possible consequences of decisions to mitigate negative publicity and outcomes.
– Closely monitor response and make arrangements for extra bandwidth capacity – both infrastructure and people – to handle an initial flood of inquiries if needed.
After public disclosure
Once a breach is disclosed, researchers and opportunistic malicious actors will look for additional weaknesses in infrastructure. After the Equifax breach an insecure portal used to manage credit report disputes was discovered. When the news becomes public immediate questions arise as to who was responsible, what data was compromised and how the data is being used. The answers to these questions can dictate the impact of the breach to the organization and its customers.
– Communicate clearly when a breach happens, stating the knowns and unknowns publicly; speculation from media and researchers can damage reputation.
– Look for your compromised data online to try to discern the attacker’s motive, if not identity; understanding whether the motive was financial gain may help mitigate against prolonged malicious activity. For example, knowing that financial fraud is imminent helps to put counter measures in place.