How Equifax Neglected Cybersecurity and Suffered a Devastating Data Breach
Total Page:16
File Type:pdf, Size:1020Kb
United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH TABLE OF CONTENTS EXECUTIVE SUMMARY ......................................................................................................... 1 The Subcommittee’s Investigation ..................................................................................... 6 Findings of Fact and Recommendations ........................................................................... 6 I. BACKGROUND ............................................................................................................ 12 A. Consumer Reporting Agencies ................................................................................ 14 1. Equifax ......................................................................................................................... 15 2. Experian ....................................................................................................................... 15 3. TransUnion ................................................................................................................. 16 B. Federal Regulation of Consumer Reporting Agencies ....................................... 16 C. The Federal Government’s Role in Sharing Information on Cybersecurity Threats .............................................................................................. 18 D. Data Breach Notification Standards ..................................................................... 20 II. EQUIFAX WAS AWARE OF CYBERSECURITY WEAKNESSES FOR YEARS............................................................................................................................. 21 A. Equifax Learned of Significant Cybersecurity Deficiencies in 2015 .............. 21 1. Purpose of the Audit .................................................................................................. 21 2. The Audit Highlighted a Backlog of over 8,500 Vulnerabilities with Overdue Patches ........................................................................................................ 22 3. Key Audit Findings Demonstrate Equifax’s Ineffective Patch and Configuration Management .................................................................................... 23 a. Equifax Did Not Follow Its Own Schedule for Remediating Vulnerabilities ......................................................................................................... 24 b. Equifax Lacked a Comprehensive IT Asset Inventory................................... 25 c. Equifax Had a Reactive Patching Process ........................................................ 25 d. Equifax Used an “Honor System” for Patching ............................................... 26 e. Equifax Did Not Consider the Criticality of IT Assets When Patching ..... 27 4. Equifax Conducted No Follow-Up Audits After the 2015 Audit ..................... 28 B. Patching Issues Remained Leading up to the Breach in 2017 ........................ 29 1. Equifax’s Scan Process Was Global; Patch Management Was Regional ...... 29 2. It Was Unclear Whether IT Was Following Patch Management and Vulnerability Management Procedures ................................................................ 30 3. Equifax Needed a New Scanning Tool .................................................................. 30 III. EQUIFAX’S RESPONSE TO THE VULNERABILITY THAT FACILITATED THE BREACH WAS INADEQUATE AND HAMPERED BY ITS NEGLECT OF CYBERSECURITY .......................................................................... 31 A. The Tools Necessary to Exploit the March 2017 Apache Struts Vulnerability Were Publicly Available and Easy to Use .................................. 33 B. Equifax Did Not Follow Its Patch Management Policy When Responding to the Apache Struts Vulnerability ................................................. 35 1. Equifax’s Patch Management Policy Required the IT Department to Patch Critical Vulnerabilities Within 48 Hours ................................................. 35 2. Equifax Did Not Patch the Apache Struts Vulnerability Until August 2017 ................................................................................................................ 37 C. Equifax Held Monthly Meetings to Discuss Threats and Vulnerabilities, but Follow-Up Was Limited and Key Senior Managers Did Not Attend ..... 37 1. Equifax Highlighted the Apache Struts Vulnerability in Its March GTVM Meeting ........................................................................................................... 38 2. Prior to the Breach, Senior Managers from Equifax Security Teams Did Not Regularly Participate in These Monthly Meetings .................................... 39 D. The Equifax Employee Who Was Aware of Equifax’s Use of Apache Struts Software Was Not on the Relevant Email Distribution List .............. 40 E. Equifax Scanned Its Systems and Servers for the Vulnerable Versions of Apache Struts and Found No Vulnerability ........................................................ 41 F. Expired SSL Certificates Delayed Equifax’s Ability to Detect the Breach for Months ................................................................................................................... 43 G. Once Inside Equifax’s Online Dispute Portal, the Hackers Accessed Other Equifax Databases......................................................................................... 45 H. Equifax Waited Six Weeks to Inform the Public of the Breach....................... 46 1. Some Companies Have Disclosed Data Breaches Days After Discovering Them ...................................................................................................... 48 2. Other Companies Made Public Disclosure Years Later or Simply Declined to Notify ....................................................................................................................... 50 I. Several Current and Former Senior Equifax Employees Believe Equifax Acted Appropriately in Responding to the Apache Struts Vulnerability ..... 51 IV. EQUIFAX’S LARGEST COMPETITORS, TRANSUNION AND EXPERIAN, WERE ABLE TO QUICKLY IDENTIFY WHERE THEY WERE RUNNING VULNERABLE VERSIONS OF APACHE STRUTS AND PROACTIVELY BEGAN PATCHING .................................................................................................... 55 A. CRAs Had Different Timelines for Patch Management .................................... 55 1. TransUnion ................................................................................................................. 55 2. Experian ....................................................................................................................... 56 B. CRAs Generally Performed Vulnerability Scans on a Regular Basis ............ 57 1. TransUnion ................................................................................................................. 57 2. Experian ....................................................................................................................... 58 C. Other CRAs Maintained an IT Asset Inventory ................................................. 58 1. TransUnion ................................................................................................................. 58 2. Experian ....................................................................................................................... 58 D. CRAs Lacked Written Policies for Tracking the Validity of SSL Certificates .................................................................................................................. 59 1. TransUnion ................................................................................................................. 59 2. Experian ....................................................................................................................... 59 E. Equifax’s Two Largest Competitors, TransUnion and Experian, Avoided a Cybersecurity Breach ............................................................................................ 60 1. TransUnion ................................................................................................................. 60 2. Experian ....................................................................................................................... 61 V. EQUIFAX FAILED TO PRESERVE A COMPLETE RECORD OF EVENTS SURROUNDING THE BREACH ........................................................... 62 A. Equifax’s Document Retention Policy ................................................................... 63 1. Equifax’s Document Retention Schedule.............................................................. 63 2. Equifax’s Legal Hold Policy ..................................................................................... 64 B. Equifax’s Use of Lync ................................................................................................ 65 C. Equifax Employees Used Lync to Discuss Business Matters, Including Events Surrounding the 2017 Data Breach ........................................................ 65 HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH EXECUTIVE SUMMARY The effects of data breaches are often long-lasting and challenging to reverse.