In other words every person's credit in the U.S. is in jeopardy right now because the rest of the population are children under 18 or adults without credit. If you take 143 million and compare it to the population you have the right amount for people who actually would have credit.
begin quote from:
Equifax Suffered Data Breach After It Failed to Patch Old Apache ...
thehackernews.com/2017/09/equifax-apache-struts.html
Credit card fraud spikes after Equifax cyber-attack | New York Post
nypost.com/2017/09/08/credit-card-fraud-spikes-after-equifax-cyber-attack/
6 days ago - Thieves appear to have started using the data stolen in the gigantic Equifax cyber -heist, one expert said Friday. Credit card fraud unexpectedly ...
Equifax breach exposed data for 143 million consumers - CBS News
https://www.cbsnews.com › MoneyWatch › Markets
Equifax Continues to Plunge Amid Mounting Scrutiny Pressure - Zacks
https://www.zacks.com/.../equifax-continues-to-plunge-amid-mounting-scrutiny-press...
21 hours ago - Shares of Equifax (EFX) continue to hit new lows amid mounting scrutiny pressure from lawmakers, investigating agencies and regulators over ...
Equifax Continues to Plunge Amid Mounting Scrutiny Pressure - Nasdaq
www.nasdaq.com/.../equifax-continues-to-plunge-amid-mounting-scrutiny-pressure-c...
Equifax confirms Apache Struts security flaw it failed to patch is to blame for hack
The company said the March vulnerability was exploited by hackers.
Equifax has confirmed that a web server vulnerability in Apache Struts
that it failed to patch months ago was to blame for the data breach that
affected 143 million consumers.
In a brief statement, the credit rating giant said:
"Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted."
"We know that criminals exploited a U.S. website application vulnerability," the statement added.
"The vulnerability was Apache Struts CVE-2017-5638. We continue to work with law enforcement as part of our criminal investigation, and have shared indicators of compromise with law enforcement."
For its part, Equifax still has not provided any evidence to support the claim.
The cited Apache Struts flaw dates back to March, according to a public vulnerability disclosure. Patches were released for the vulnerability, suggesting that Equifax did not install the security updates.
Apache Struts is used across the Fortune 100 to provide web applications in Java, and it powers front- and back-end applications, including Equifax's public website.
Earlier, unconfirmed reports had pointed to Struts as the root of the cyber attack. At least one of the reports, citing a research analyst from equity research firm Baird, was subsequently retracted.
The Apache Foundation, which maintains the Apache web software, said days ago in response to media reports -- prior to any confirmation from the company -- that at the time it was not clear if Struts was to blame for the cyber attack.
The company is said to have enlisted FireEye-owned Mandiant for its incident recovery.
Despite several requests over the past week, the company has not answered specific questions or responded to requests for comment.
In a brief statement, the credit rating giant said:
"Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted."
"We know that criminals exploited a U.S. website application vulnerability," the statement added.
"The vulnerability was Apache Struts CVE-2017-5638. We continue to work with law enforcement as part of our criminal investigation, and have shared indicators of compromise with law enforcement."
ADVERTISING
The cited Apache Struts flaw dates back to March, according to a public vulnerability disclosure. Patches were released for the vulnerability, suggesting that Equifax did not install the security updates.
Apache Struts is used across the Fortune 100 to provide web applications in Java, and it powers front- and back-end applications, including Equifax's public website.
Earlier, unconfirmed reports had pointed to Struts as the root of the cyber attack. At least one of the reports, citing a research analyst from equity research firm Baird, was subsequently retracted.
The Apache Foundation, which maintains the Apache web software, said days ago in response to media reports -- prior to any confirmation from the company -- that at the time it was not clear if Struts was to blame for the cyber attack.
The company is said to have enlisted FireEye-owned Mandiant for its incident recovery.
Despite several requests over the past week, the company has not answered specific questions or responded to requests for comment.
No comments:
Post a Comment