USA TODAY US Edition

EQUIFAX HAD FIX TO AVERT HACKING

Fix was available two months before hackers stole info from credit-reporting agency

- Elizabeth Weise and Nathan Bomey

Hackers took advantage of an Equifax security vulnerabil­ity two months after a group shared a fix for it.

Hackers took advantage of an Equifax security vulnerabil­ity two months after an industry group discovered the coding flaw and shared a fix for it, raising questions about why the credit-reporting agency didn’t update its software successful­ly when the danger became known.

A week after Equifax revealed one of the largest breaches of consumers’ private financial data in history — 143 million consumers and access to credit-card data of 209,000 — the industry group that manages the open source software in which the hack occurred blamed Equifax.

“The Equifax data compromise was due to (Equifax’s) failure to install the security updates provided in a timely manner,” The Apache Foundation, which oversees the widely-used open source software, said in a statement Thursday.

Equifax told USA TODAY late Wednesday the criminals who gained access to its customer data exploited a website applicatio­n vulnerabil­ity known as Apache Struts CVE-2017-5638.

The vulnerabil­ity was patched on March 7, the same day it was announced, The Apache Foundation said. Cybersecur­ity profession­als who lend their free services to the project of opensource software — code that’s shared by major corporatio­ns and that’s tested and modified by de- velopers working at hundreds of firms — had shared their discovery with the industry group, making the risk and fix known to any company using the software. Modificati­ons were made on March 10, according to the National Vulnerabil­ity Database.

But two months later, hackers took advantage of the vulnerabil­ity to enter the credit reporting agency’s systems: Equifax said the unauthoriz­ed access began in mid-May. Equifax did not respond to a question Wednesday about whether the patches were applied, and if not, why not.

It should have have acted faster to successful­ly deal with the

“The Equifax data compromise was due to (Equifax’s) failure to install the security updates provided in a timely manner.”

The Apache Foundation, which oversees the open source software

problem, other cybersecur­ity profession­als said.

“A typical bank would have patched this critical vulnerabil­ity within a few days,” said Pravin Kothari, CEO of CipherClou­d, a cloud security company.

Federal regulators are investigat­ing whether Equifax is at fault. The Federal Trade Commission and the Consumer Financial Protection Bureau have said they’ve opened probes into the hack.

So far dozens of state attorneys general are investigat­ing the breach, and on Tuesday Massachuse­tts Attorney General Maura Healey said she plans to sue the company for violating state consumer protection laws. More than 23 class-action lawsuits against the company have also been proposed.

Equifax shares fell 2.5% Thursday after news of the FTC probe and are down 33% since it revealed the hack.

Informatio­n potentiall­y stolen, including Social Security numbers and dates of birth and names, could put people at risk of identity theft for the rest of their lives, credit experts warn.

To some in the industry, it’s not that Equifax had bad security practices, but that such poor security hygiene is all too common.

“This is not some crazy movieplot attack scenario,” says Jeff Williams, co-founder of Contrast Security. “There is really no excuse for organizati­ons not to be prepared for this totally expected scenario. They should have a well-practiced playbook and run it often.”

 ?? DARYL BJORAAS, USA TODAY ??
DARYL BJORAAS, USA TODAY

Newspapers in English

Newspapers from United States