Detect and Prevent Dark Web Credit Card Fraud
Dark Web Monitoring Security Tools
Credit Card Fraud on the Dark Web Credit card fraud on the dark web operates quite differently from what many people …
In 2017, Equifax suffered a massive data breach, often considered one of the most significant and devastating cybersecurity incidents in history.
As one of the major credit reporting agencies in the United States, Equifax held sensitive information on more than 800 million individuals and 88 million businesses worldwide.
The breach exposed the personal data of more than 40 percent of the population of the United States (approximately 145 million people). The leaked data included names, birth dates, physical addresses, and Social Security Numbers. A small subset of victims (around 200,000 people) had their credit card numbers exposed as well.
In this case study, we’ll explore how the Equifax data breach happened, the company’s response, the associated breach costs, and lessons learned.
Based on a report from the U.S. General Accounting Office, the Equifax data breach was caused by a combination of issues. On March 10, 2017, the attackers gained initial access to their network by exploiting the CVE-2017-5638 vulnerability on their online dispute portal.
This flaw let malicious users send code within a specially crafted HTTP content-type header, which was subsequently executed on the Apache Struts server. Although a patch existed for this vulnerability, the security team did not not apply it in time.
On May 13, 2017, the attackers pivoted to other servers within the network due to a lack of proper network segmentation. Once on the other machines, the attackers found plaintext credentials, which gave them access to even more servers.
From May - July 2017, the data thieves accessed multiple databases containing sensitive information on hundreds of millions of people. When exfiltrating data, a widespread technique among cybercriminals is to encrypt data in transit to make it more difficult for their victim to discover the attack.
While Equifax had network monitoring tools that were supposed to decrypt, analyze, and re-encrypt the data, the monitoring tools didn’t work because of an expired TLS certificate. In other words, because Equifax didn’t renew their cert, encrypted traffic wasn’t being inspected. As a result, they had zero visibility into the type of data that was leaving their network.
On July 29, 2017, the administrators renewed the expired certificate, at which point they immediately noticed the suspicious activity. At this point, the breach was discovered and an internal investigation was launched. On September 8, 2017, more than a month into the investigation, Equifax publicized the breach.
During the interim month of August, several Equifax executives sold company stock. The stock sell-off led to suspicions that they sold ahead of an impending price decline due to the breach. In the end, only the (former) chief information officer was charged with insider trading.
The Equifax breach had far-reaching impacts, from financial losses and reputational damage for the company to increased identity theft risks for consumers. Here are the main impacts from the breach:
Despite the large amount of data stolen, it never leaked onto the dark web. Another clue is that despite the initial access gained on March 10, 2017, it wasn’t until May 13, 2017, over two months later, that the attackers pivoted and started exfiltrating data.
Investigators believe the first attack was carried out by initial access brokers exploiting the recent Struts vulnerability. Eventually, they sold their access to more experienced attackers. In what the GAO report referred to as a “separate incident,” a different threat actor gained access to the online dispute portal on May 13, 2017, and used several techniques to retrieve the PII residing on other systems and exfiltrated that data.
On February 10, 2020, the United States Department of Justice charged four members of the Chinese military with the attack. Why would the Chinese government be interested in the data? In 2015, the U.S. Office of Personnel Management was hacked, leaking over 22.1 million records. In 2018, Marriott’s Starwood hotel chain was breached, leaking approximately 500 million records as well. In both incidents, the highly sensitive data was never sold or traded on the dark web. This led investigators to connect the three breaches.
The attacks are assumed to be an attempt by the Chinese government to build a dossier on millions of Americans with the intent to learn about U.S. government officials and intelligence officers. Specifically, the data leaked would shed light on individuals who could be manipulated due to financial trouble or blackmail attempts.
Equifax’s response to the breach was widely criticized for several reasons. Initially, they created a stand-alone domain titled equifaxsecurity2017.com to host information for those affected by the breach. The domain name looked suspicious as it’s the same style often used in phishing attacks. To make matters worse, Equifax’s official social media accounts mistakenly pointed users to a domain titled securityequifax2017.com.
What perhaps outraged people the most was that the original language used on the site required victims to waive their lawsuit rights to check whether they were affected. This was eventually updated. However, it’s certainly a good lesson in how not to respond to an incident.
Eventually, a new domain, with yet another confusing name, was created where you can check if you were affected:
https://eligibility.equifaxbreachsettlement.com/en/Eligibility.
It’s important to note that the FTC, not Equifax runs this website.
Equifax had a cybersecurity insurance policy with a coverage limit of $125 million and a deductible of $7.5 million at the time of the breach. The company stated, “We have received the maximum reimbursement under the insurance policy of $125 million, all of which was received before 2019.”
In 2019, Equifax settled with the FTC. While the breach was entirely preventable, in total the incident cost them $1.38 billion. The agreement required Equifax to set aside a minimum of $380.5 million for breach compensation and spend another $1 billion on improving its information security practices. As a direct result of the breach, the CEO, CSO, and CIO all parted ways with the company. Then, in June 2019, Moody’s downgraded Equifax’s financial rating due to the escalating litigation and regulatory costs associated with the breach.
The settlement offered free credit monitoring or up to $125 cash payment. Claimants who submitted a valid claim for credit monitoring services received an email with information on how to activate credit monitoring services with Experian. Victims were also eligible for at least seven years of free identity restoration services to help them with the effects of identity theft and fraud.
Victims could claim out-of-pocket losses (excluding losses of money and time spent freezing or unfreezing credit reports or purchasing credit monitoring or identity theft protection) by providing documentation, but depending on the number of claims filed, the amount paid out is usually reduced.
After the breach, U.S. lawmakers passed a law allowing consumers to freeze their credit reports at no cost. Until then, in some states, consumers had to pay for a credit freeze, restricting access to a person’s credit file. A credit freeze makes it harder for identity thieves to open accounts in someone else’s name, which can damage their credit score.
Hopefully, our Equifax case study was informative. Here are our top takeaways from the data breach:
Dark Web Monitoring Security Tools
Credit Card Fraud on the Dark Web Credit card fraud on the dark web operates quite differently from what many people …
Dark Web Monitoring Educational Content
What Is the Dark Web? The Dark Web is a portion of the internet not indexed by standard search engines. It’s accessible …