CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

EquiFIX – Lessons Learned From the Most Impactful Breach in U.S. History

While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization if you were similarly targeted?

While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization if you were similarly targeted?

As we all know, the impact of the Equifax breach is widespread, potentially affecting 145.5 million individuals in the U.S., Canada and the UK whose personally identifiable information (PII) and (to some extent) financial information was accessed by malicious actors. The exact impact is yet to be seen and depends on the motives of the attackers and the ways in which they plan to use the data, but any exposure puts individuals at risk. We’ve also seen tremendous impact on the company as a result of the breach, including a dramatic drop in share price, reputational damage, and job losses for some senior staff members including the CEO. There’s more to come as the total costs of dealing with the breach itself mount and the incident makes its way through the legal system. 

In the midst of National Cyber Security Awareness Month and with the pain of this breach fresh in our minds, now is an appropriate time to reflect on the lessons we can learn before, during and after discovering a breach to address gaps in processes and technologies and help prevent, detect and mitigate these types of threats.

Before the breach

Equifax has said that the initial intrusion was through exploitation of a vulnerable Apache Struts web application. It turns out that prior to the intrusion multiple alerts about exploitation of this particular vulnerability were issued and a patch was made available. However even without following recommended patch management programs, implementing other basic security principles could have mitigated the damage.

Lessons:

• Maintain awareness of what an attacker can see regarding your infrastructure, people and processes so you can see potential weaknesses and points of access for attackers.

• Understand what methods attackers are using against your sector so you can proactively protect your valuable digital assets.

Advertisement. Scroll to continue reading.

• Establish and maintain a threat intelligence program and act on the intelligence.

• Implement and follow general cybersecurity good practice measures, such as defense-in-depth, and include vulnerability and patch management.

• Protect your sensitive information through the use of encryption and network segmentation.

• Educate users on the importance of password hygiene and strong authentication requirements.

• Go a step further and assume a breach will occur and plan for this outcome. Ensure your strategy, people and processes are in place in advance.

After discovery

Not only did Equifax have to deal with the fallout of the breach itself, but unusual trading activity in Equifax shares have provoked suspicions of insider trading and a criminal investigation. Further, Equifax’s infrastructure to handle customer inquiries proved inadequate and some of the strategies put in place to address customer concerns in the wake of the discovery backfired.

Lessons:

Control knowledge of a breach to trusted individuals to prevent collateral damage; no matter how swiftly an organization moves there will always be some lapse in time between discovery and disclosure.

Anticipate fallout and prepare for announcements by analyzing the possible consequences of decisions to mitigate negative publicity and outcomes.

Closely monitor response and make arrangements for extra bandwidth capacity – both infrastructure and people – to handle an initial flood of inquiries if needed.

After public disclosure

Once a breach is disclosed, researchers and opportunistic malicious actors will look fo
r additional weaknesses in infrastructure. After the Equifax breach an insecure portal used to manage credit report disputes was discovered. When the news becomes public immediate questions arise as to who was responsible, what data was compromised and how the data is being used. The answers to these questions can dictate the impact of the breach to the organization and its customers.

Lessons:

• Communicate clearly when a breach happens, stating the knowns and unknowns publicly; speculation from media and researchers can damage reputation.

• Look for your compromised data online to try to discern the attacker’s motive, if not identity; understanding whether the motive was financial gain may help mitigate against prolonged malicious activity. For example, knowing that financial fraud is imminent helps to put counter measures in place.

The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe. Security professionals and executive management can use this as an opportunity to identify areas they can address to better prepare for and deal with a breach. In the weeks and months to come as more information comes to light, it’s in our collective best interest to focus on gaining a deeper understanding of what we can do to mitigate risk. 

Written By

Alastair Paterson is the CEO and co-founder of Harmonic Security, enabling companies to adopt Generative AI without risk to their sensitive data. Prior to this he co-founded and was CEO of the cyber security company Digital Shadows from its inception in 2011 until its acquisition by ReliaQuest/KKR for $160m in July 2022. Alastair led the company to become an international, industry-recognised leader in threat intelligence and digital risk protection.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.