Security

Tech security at Equifax was so diabolical, senators want to pass US laws making its incompetence illegal

Now Homeland Security committee sticks the boot in


Credit-rating monitor Equifax ignored years of warnings and red flags before it was thoroughly ransacked in 2017 by hackers, who made off with the personal information of roughly 150 million Americans, Brits, and Canadians, according to another congressional probe.

An investigation [PDF] by the US Senate Committee on Homeland Security and Governmental Affairs found that the credit agency was negligent in both the periods before and after it was hacked. The publication of the committee's findings this week follows a similarly scathing report issued late last year by House reps.

According to the Senate panel, Equifax staff knew their systems were not tightly secured and open to attack in 2015, yet failed to properly secure their networks, and were eventually pwned two years later via a hole in an Apache Struts 2 installation – a security hole that a patch was publicly available for but had not been deployed.

The senators report painted a sprawling picture of the information-security dysfunction at Equifax in the lead up to the database breach, including a lack of communication among the security team. The admin in charge of the Struts application was not included on the security mailing list, and senior managers from the security teams did not attend monthly meetings that would touch on vulnerability risks.

As a result, the report noted, Equifax wasn't able to patch the Struts vulnerability until August of 2017, one month after the data theft had occurred. Even when patches were in place, the committee noted, the process was chaotic and disorganized.

"Equifax’s system for vulnerability scanning was a global process that was disconnected from the company’s regional patch management process," the study stated. "Equifax’s former Director of the global threats and vulnerability management team told Subcommittee staff that in some cases, patching was regional, and some cases it was global."

The patching problems were not a new phenomenon, either. Back in 2015, an internal audit found that Equifax had thousands of unpatched vulnerabilities in its internal software.

"The audit revealed that Equifax did not fix vulnerabilities in a timely manner," the senators stated. "For example, there were “over 8,500 [sic] medium, high or critical vulnerabilities existing with a large percentage of those being over 90 days outstanding."

And it's go, go, go for class-action lawsuits against Equifax after 148m personal records spilled in that mega-hack

READ MORE

Not surprisingly, the company that the committee declared "negligent" in its handling of cyber security was also scolded for its response to the massive data theft. The report once again pointed out how an expired SSL certificate in a network traffic monitoring device prevented Equifax from detecting and discovering the breach for months, and how the company waited six weeks to provide the public with any information.

Now, the committee is recommending that Congress take steps at the federal level to prevent such security disasters from ever happening again. The senators urge legislators write up and pass laws that would require companies to take basic security precautions, and follow a set process for notifying customers.

"Congress should pass legislation that establishes a national uniform standard requiring private entities that collect and store PII [personally identifiable information] to take reasonable and appropriate steps to prevent cyber-attacks and data breaches," the committee insisted. "Congress should pass legislation requiring private entities that suffer a data breach to notify affected consumers, law enforcement, and the appropriate federal regulatory agency without unreasonable delay." ®

Send us news
60 Comments

US and Europe try to tame surveillance capitalism

Trade watchdog argues that browsing and location data are sensitive and deserve to be defended

Microsoft calls AI privacy complaint 'doomsday hyperbole'

Plaintiffs seek termination of permissionless and unpaid AI data harvesting

Google gooses Safe Browsing with real-time protection that doesn't leak to ad giant

Rare occasion when you do want Big Tech to make a hash of it

We talk to W3C board vice-chair Robin Berjon about the InterPlanetary File System

The decentralized web is alive and well despite Web3 financial scheming

Uncle Sam wants to know how big airlines use passenger data

'Problematic' carriers can look forward to scrutiny, fines, and new rules

Row breaks out over true severity of two DNSSEC flaws

Some of us would be happy being rated 7.5 out of 10, just sayin'

Labor watchdog wants SpaceX's gag clauses to disintegrate like its exploding rockets

This is why Big Biz wants to dismantle America's crucial regulators

Congress votes unanimously to ban brokers selling American data to enemies

At least we can all agree on something

UN: E-waste is growing 5x faster than it can be recycled

Right to Repair should be the Obligation to Repair, if we want to avoid drowning in trashed electronics

Whizkids jimmy OpenAI, Google's closed models

Infosec folk aren’t thrilled that if you poke APIs enough, you learn AI's secrets

Airbnb warns hosts who use indoor security cameras they may face eviction

No more creepy snooping? Be my guest

Microsoft decides it's done with Azure egress ransoms

Cloud exit toll booth bypass built by EU regulators
BREAKING NEWS: FTX crypto-crook Sam Bankman-Fried gets 25 years in prison