Equifax Website Breach: Compromised or Collateral Damage?

Equifax Website Breach: Compromised or Collateral Damage?

Oops!...Equifax did it again.

Oops!...Equifax did it again. On October 12, 2017, news broke regarding Equifax’s second website breach, hitting headlines around the world. The consumer information services portal set up to help consumers manage their exposure to a previously disclosed website breach presented website visitors with malware. This time, Equifax blamed compromised third-party website performance code. With Equifax quickly passing the buck to the third-party vendor, a question emerges: Was Equifax’s website compromised or is the company just collateral damage?

Let’s get straight to the point: Equifax was both compromised and collateral damage. When third-party web code is breached, there are two possibilities: the vendor is an authorized and known entity whose activity is unchecked or the vendor wasn’t authorized but was still able to execute code on the consumer device. The former demonstrates a general disregard for digital vendor activity while the latter indicates a lack of control. Either way, Equifax did not execute an effective digital vendor risk management program and definitely cannot play the victim.

Second time unlucky: Here’s what went wrong
Considering the significant impact of its first breach, you’d think Equifax would have been more vigilant with website security. It wasn’t. The second breach involved a series of rapid auto-redirects ultimately serving a fake Adobe Flash alert. Upon user-initiated click, malicious files downloaded onto the user device causing unwanted display of advertisements or toolbars. Many researchers believe this to be a malvertising attack, however, no digital ads were involved in delivering the malware. Instead, this is a classic case of website-level malware, where, typically non-advertising code is leveraged to execute an attack.

 

This particular incident sheds light on a crucial, yet under-appreciated, tenet of cyber attack defense. It’s about the delivery mechanism, not the malware or payload. Centerbluray.info, the malicious domain in this particular incident, began to display suspicious behavior, which was confirmed malicious in September. And, it’s not alone. Over the past several months, it is just one of many domains used to present fake flash updates, media player installs, and user tracking alerts with the intention of infecting user devices with malware.

 

Once again, this attack proves that secure coding practices and appsec solutions are inadequate protection for the highly-dynamic digital ecosystem. Comprehensive website and mobile app security requires knowing all digital partners, approving their presence and activity, and continuously monitoring all first and third party code for suspicious behavior. If Equifax had done this they would have seen the anomalous code within moments of its presence on the website and, avoided infecting numerous consumers.

 

Enterprises are susceptible: Time to revisit website security
In today’s digital world, no one is immune to cyber attacks. To avoid becoming the next front-page news story, enterprises can reevaluate website security by asking these questions:

  • Do we know all the third-party (and fourth and fifth) vendors executing in our digital ecosystem?
  • What activities do they perform?
  • Are they executing unexpected code, i.e., redirects, data tracking, etc.?
  • Have we shared a digital asset policy covering security, data, quality and performance requirements with all the vendors?
  • How do we monitor for violations of the digital asset policy, and general security and data compliance concerns?

 

Keep in mind that it doesn’t matter that a third-party hosted the malicious file or that this consumer-facing website is not connected to internal systems or databases. Onus is on the enterprise to control its digital vendors and assets. Website governance is no longer optional and can only be achieved through a robust digital vendor risk management program.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.