{"id":9223,"date":"2017-09-12T04:10:06","date_gmt":"2017-09-12T12:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/12\/news-2996\/"},"modified":"2017-09-12T04:10:06","modified_gmt":"2017-09-12T12:10:06","slug":"news-2996","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/12\/news-2996\/","title":{"rendered":"Equifax breach: What you need to know [updated]"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 08 Sep 2017 07:02:47 +0000<\/strong><\/p>\n<h3>[updates 9\/12\/2017]<\/h3>\n<p>You can follow Equifax&#8217;s efforts in response to this incident here:\u00a0<a href=\"https:\/\/www.equifaxsecurity2017.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.equifaxsecurity2017.com<\/a><\/p>\n<p>Over 30 lawsuits have been filed against Equifax following the breach <a href=\"http:\/\/www.reuters.com\/article\/us-equifax-cyber-lawsuits\/lawsuits-against-equifax-pile-up-after-massive-data-breach-idUSKCN1BM2E3\" target=\"_blank\" rel=\"noopener\">according to Reuters<\/a>.<\/p>\n<p><a href=\"https:\/\/qz.com\/1073221\/the-hackers-who-broke-into-equifax-exploited-a-nine-year-old-security-flaw\/\" target=\"_blank\" rel=\"noopener\">Quartz reported<\/a>\u00a0that the vulnerability they mentioned\u00a0was in a popular open-source software package called Apache Struts, which is a programming framework for building web applications in Java. Two vulnerabilities in Struts have been discovered so far in 2017. The vulnerability announced on Sept. 4 has existed in Struts since 2008.<\/p>\n<p>Apache responded to that report with\u00a0<a href=\"https:\/\/blogs.apache.org\/foundation\/entry\/apache-struts-statement-on-equifax\" target=\"_blank\" rel=\"noopener\">this Apache Struts Statement on Equifax Security Breach<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>On July 29, 2017, Equifax discovered that attackers had gained unauthorized access to private data belonging to an estimated 143 million Americans by exploiting a vulnerability in a website application. It is unknown at this point whether said vulnerability was a zero-day or had already been patched. The former would indicate that other companies could have also been attacked, while the latter would reflect on Equifax&#8217;s overall\u00a0security posture.<\/p>\n<p><a href=\"https:\/\/www.equifaxsecurity2017.com\/frequently-asked-questions\/\" target=\"_blank\" rel=\"noopener\">According to Equifax<\/a>, online criminals maintained their presence from mid-May through July 2017 and had access to:<\/p>\n<ul>\n<li>Names<\/li>\n<li>Social Security numbers<\/li>\n<li>Birth dates<\/li>\n<li>Addresses<\/li>\n<li>Driver\u2019s license numbers (in some cases)<\/li>\n<li>Credit card numbers (for approx.\u00a0209,000 U.S. consumers)<\/li>\n<\/ul>\n<p>It also said that some personal information for\u00a0certain UK and Canadian residents was part of this breach.<\/p>\n<p>This is obviously bad news for consumers and it will only increase the lack of trust they have towards corporations that collect and store their data. It also serves as a reminder that there are ways to be proactive and exercise your right to have\u00a0access to your\u00a0information and put certain restrictions in place to make identity theft harder.<\/p>\n<p>Equifax is offering a\u00a0free identity theft protection and credit file monitoring to all of its U.S. customers while still investigating the intrusion, working along with a private firm and law enforcement. More information about this breach and how to apply for ID theft protection can be found by going to <a href=\"https:\/\/www.equifaxsecurity2017.com\/\" target=\"_blank\" rel=\"noopener\">equifaxsecurity2017.com<\/a>, a website Equifax has just set up.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/\">Equifax breach: What you need to know [updated]<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 08 Sep 2017 07:02:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/' title='Equifax breach: What you need to know [updated]'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/Untitled-design.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>On July 29, 2017, Equifax discovered that attackers had gained unauthorized access to private data belonging to an estimated 143 million Americans by exploiting a vulnerability in a website application. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/breach\/\" rel=\"tag\">breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/equifax\/\" rel=\"tag\">Equifax<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/identity-theft\/\" rel=\"tag\">identity theft<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/' title='Equifax breach: What you need to know [updated]'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/09\/equifax-breach-what-you-need-to-know\/\">Equifax breach: What you need to know [updated]<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11510,4503,11172,12310,3919,3921],"class_list":["post-9223","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-breach","tag-cybercrime","tag-data-breach","tag-equifax","tag-hacking","tag-identity-theft"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9223"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9223\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9223"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}