cancel
Showing results for 
Search instead for 
Did you mean: 

Chinese military officials charged with Equifax breach

tag
Anonymous
Not applicable

Re: Chinese military officials charged with Equifax breach


@iced wrote:

My comment is aimed at the oversimplification that people outside of the issue make toward security breaches, often trying to make things out like it was a simple, simple fix that even a third grader would have known to do. While there are instances where this ends up being the case, in the vast majority of the security incidents, it's not so simple.

In this case, it was a simple fix.

 

"On March 7, the Apache Software Foundation released a patch for the vulnerabilities; on March 9, Equifax administrators were told to apply the patch to any affected systems, but the employee who should have done so didn't."

 

We don't know how their sensitive data is/was stored, but the probability is extremely high that EaR is already being done. The data they store falls under multiple regulations, some of which already requires EaR. We don't know in what form the breached data was stored

Yes we do: "When asked specifically whether Equifax had encrypted its databases or not, Smith [Richard Smith, Equifax’s then CEO] responded by saying “We use many techniques to protect data: encryption, tokenization, masking, encryption in motion, encrypting at rest. To be very specific, this data was not encrypted at rest.”

 

. We do know the attackers exploited CVE2017-5638 to get at the data, which as I'm sure you know means they exploited a web application framework associated with their U.S. online dispute portal (Apache Struts) to execute commands/code of their choice. If this particular instance had the appropriate privileges to access data, it likely did so using whatever API keys or service account access it had been granted to do its day-to-day application functions, which would have completely sidestepped EaR anyway. We also know the hackers did not access the data from Equifax’s core consumer credit reporting databases. 

 

One could argue a CASB or CASB-esque solution might (and that's a big might) have been effective, but again unless someone on this thread works for Equifax and chose to breach confidentiality to share further technical details not publicly known, we're just spitballing solutions. At any rate, reducing this issue to something trivial and simple like enabling encryption is armchair quarterbacking.

 

To be clear, there was a failure of some process or of the leadership at Equifax that resulted in a known vulnerability continuing to be exposed between the vulnerability's publication in March and the beginning of the data breach period in May, and to the extent we'll ever see they are being held accountable for that failure.

 

But that's a lot less interesting thinking 100+ million identities were breached because someone didn't enable BitLocker. Indeed, in today's social media world everyone's an expert.

 


It's not as simple as just using hardware encryption. But I do know for certain that if someone gains physical access to our site and steals a 42U rack of drives, the data is going to be useless to them.

 

I'm a severely overworked and underpaid (by choice for equity stake) senior software developer that has to handle Office365, Azure devops, and general Azure Admin tasks all by myself at the moment. There is no way I can keep up with the security side, so I rely on Azure Security Center for the vuln monitoring. I use things like Tripwire on my development machines at work and at home. I don't even browse the net on my dev machines. We hire experienced people for pen testing. I try to keep up with the latest in IOT security, both in general and with Azure.

 

No one can keep up with a highly focused group of state actors that do nothing but pen testing all day for fun. I think we all just need to assume that our systems are going to be breached and plan accordingly. Equifax clearly was not doing that in 2017, and at least some of it was really simple.

Message 11 of 12
iced
Valued Contributor

Re: Chinese military officials charged with Equifax breach


@Anonymous wrote:


No one can keep up with a highly focused group of state actors that do nothing but pen testing all day for fun. I think we all just need to assume that our systems are going to be breached and plan accordingly. Equifax clearly was not doing that in 2017, and at least some of it was really simple.


This is a good response, and I would echo something along the same lines myself. More importantly, this isn't an armchair security expert response of doing some specific simple thing (encryption) to solve the problem without fully understanding the various moving parts, including layer 8 ones, that the Equifax staff must deal with.

 

I've been in tech 20+ years now and the biggest takeaway I have from my career is that, possibly excepting finance, it seems to have the biggest problem with one-upsmanship and armchair quarterbacking from both within and outside of the community. Almost without exception, none of that armchair quarterbacking is helpful to solving the problems.

 

Complicating things, it's easy for a guy in a small shop or a hobbyist at home to make changes quickly, but that disregards the change control processes and the management and beaurocratic nightmares that enterprises must maneuver to do even a simple thing. Want a 10m fiber patch pulled to a MMR in a DC? Little shop guy walks in, pulls it, and is done $20 and 15 minutes later. Enterprise guy requires 5 approvals, a change window, and probably at least 2 union goons to do it, which will take $10,000 and 4 weeks. Sounds ridiculous to some I'm sure, but that's the enterprise world for you, and if you up and subvert that process and do it yourself, it's an RPE (Resume Producing Event).

 

It's frustrating when you're on the enterprise side of the fence and you have outsiders with no concept of the gauntlets you must run lobbing generic woulda-shoulda suggestions over that fence at us as if we're too stupid to know rebooting fixes everything. I'm sure you've encountered some of this yourself. Heck, my employer has been criticized in a similar manner on these forums in the past.

 

It is fair to blame the leadership; they are the decision makers and they hold the levers that can make the machine move faster or slower. They are the ones who are responsible when their teams fail because they (should) have the sight to see where things are starting to fall behind and the authority to get it moving again. It's not fair to reduce the problems to some basic issue and criticize that, because even in the simple cases, there's quite possibly a layer 8 issue lurking in the shadows hindering a developer or engineer's ability to resolve it.

Message 12 of 12
Advertiser Disclosure: The offers that appear on this site are from third party advertisers from whom FICO receives compensation.