{"id":9183,"date":"2017-09-08T09:00:09","date_gmt":"2017-09-08T17:00:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/08\/news-2956\/"},"modified":"2017-09-08T09:00:09","modified_gmt":"2017-09-08T17:00:09","slug":"news-2956","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/08\/news-2956\/","title":{"rendered":"Equifax Breach \u2013 an Example of Good Communications"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Equifax <a href=\"https:\/\/www.equifaxsecurity2017.com\">announced a massive breach<\/a> that could impact <i>at least<\/i> 143 million US consumers. That\u2019s 44% of the US population. This breach will have a significant impact on a lot of people.<\/p>\n<p>Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today\u2019s threat landscape. Security teams work to prevent as many attacks as possible but also practice and plan to recover quickly when a breach does occur.<\/p>\n<p>Cybersecurity incidents are complex in nature. Businesses that operate at the scale of Equifax have a lot of moving parts and many different teams that need to co-ordinate their work.<\/p>\n<p>All of this work has to happen while the day-to-day business of the company continues as undisturbed as possible. It\u2019s a difficult balance to maintain.<\/p>\n<h1>Incident Response<\/h1>\n<p>Based on their current statement, we know a few of the facts:<\/p>\n<ul>\n<li>Attackers had access to the data mid-May to 29-July-2017<\/li>\n<li>Once the company detected the intrusion, they stopped it<\/li>\n<li>Once stopped, they called in an reputable outside firm to help with the forensics<\/li>\n<li>After assessing the impact to consumers, they\u2019ve taken steps to help protect them from further damage<\/li>\n<\/ul>\n<p>From the outside, this shows us that Equifax has a strong incident response process in place and that process is working. Some may question calling in an outside firm to help with the forensics but they are a couple of significant advantages to doing so.<\/p>\n<p>The first is to have more hands on deck. A true forensics investigation takes a lot of time and is a huge undertaking. Getting additional trained staff to take on this work allows the core team to continue to defend the network and help restore operations.<\/p>\n<p>The second advantage is that an outside team approaches the problem with fresh eyes and no preconceptions about how various systems are integrated. They ask questions that existing teams may overlook.<\/p>\n<p>Equifax hasn\u2019t released any technical details about the intrusion yet beyond that the attackers used an vulnerability in one of their applications to gain access. That\u2019s ok, that information isn\u2019t valuable to the impacted consumers at this point.<\/p>\n<p>What is important is the communications around the breach and that\u2019s where Equifax stands out as a positive example.<\/p>\n<h2>Breach Communications<\/h2>\n<p>Most breach notifications follow a very predicable pattern. It\u2019s one we\u2019ve seen used time and time again and it\u2019s long been a sore point for most people in the security community (myself included as I\u2019ve been complaining about it for years now).<\/p>\n<p>The general pattern is this:<\/p>\n<ol>\n<li>We\u2019ve had a breach<\/li>\n<li>Don\u2019t worry &amp; don\u2019t blame us<\/li>\n<li>We\u2019re doing what we can to make this go away<\/li>\n<li>Here\u2019s some basic coverage to protect your credit score<\/li>\n<\/ol>\n<p>Breach communications are often written in legalize or least in bland corporate speak. Understandably so as they are designed to minimize liability as well as reduce panic or concern. It\u2019s an unfortunate example of good intentions getting pushed down by <i>process<\/i>.<\/p>\n<p>Equifax bucks this trend and\u2014while the language could still be less formal\u2014does a fantastic job of clearly explaining the issues at hand.<\/p>\n<h2>Clarity<\/h2>\n<p>Their statement (which has already been updated to include new information) clearly states the:<\/p>\n<ul>\n<li>scope of the breach\n<ul>\n<li>143 million US consumer records<\/li>\n<li>An unknown number of Canadian and UK consumer records<\/li>\n<li>~209,000 US consumer credit cards<\/li>\n<li>Dispute documents relating to ~182,000 US consumers    <\/ul>\n<\/li>\n<li>steps they taking to gather more information<\/li>\n<li>how that information is being communicated to affected consumers<\/li>\n<li>who they are working with to address the situation<\/li>\n<li>what they have already setup to help consumers deal with the situation<\/li>\n<li>that they accept ownership of the issue<\/li>\n<\/ul>\n<p>It\u2019s this last point that really stands out. In the breach notification, they have a quote from their Chairman and CEO, Rick Smith. Having a senior executive quoted in a notification is somewhat common, though it\u2019s rarely the CEO. Equifax takes this a step further and has a video from Mr. Smith explaining the situation.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/bh1gzJFVFLc?feature=oembed\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>Equifax is the <b>victim<\/b> here. But they\u2019ve put that aside and their leader is on camera taking ownership of the issue and doing his best to help affected consumer deal with the situation.<\/p>\n<p>This is exemplary work by their incident response team.<\/p>\n<h2>No Winners<\/h2>\n<p>Cybercrime is a growth area for criminals. Data is extremely valuable and a dataset of this size could be worth $27 million or more in the digital underground (based on the lowest pricing in our <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-north-american-underground.pdf\">North America Underground paper<\/a>. Page 14. $19 per 100 records).<\/p>\n<p>That\u2019s why we\u2019ll continue to see more and more attacks by criminals moving forward. Despite the defenders best efforts, some of these attacks are going to be successful.<\/p>\n<p>Where teams will fail is by failing to plan for a breach. Incident response plans should clearly lay out responsibilities, how teams communicate (outside of email), and a pre-approved external communications plan that you can work from. This is not a scenario where you want to be shooting from the hip.<\/p>\n<p>Equifax was clearly prepared to handle the fallout from a breach. That\u2019s a sign of a well trained, well prepared team. We should all follow their example.<\/p>\n<p>Are you prepared to handle incidents when they occur? How has your organization\u2019s leadership reacted to your external communications plan? Let me know on Twitter where <a href=\"https:\/\/twitter.com\/marknca\">I\u2019m @marknca<\/a>  or connect with me on <a href=\"https:\/\/ca.linkedin.com\/in\/marknca\">LinkedIn<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/equifax-breach-example-good-communications\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/iStock-486937322.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Equifax announced a massive breach that could impact at least 143 million US consumers. That\u2019s 44% of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today\u2019s threat landscape. Security teams&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[14364,10422,4503,10423],"class_list":["post-9183","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-compliance-regulations","tag-current-news","tag-cybercrime","tag-underground-economy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9183"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9183\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9183"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}