Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Calista241

(5,586 posts)
Thu Sep 14, 2017, 12:50 PM Sep 2017

Equifax, software maker blame each other for opening door to hackers

Source: Atlanta Journal-Constitution

Equifax and a software company are blaming each other for a glitch that allowed hackers to obtain Social Security numbers and other sensitive info for 143 million people.

The Atlanta-based company, one of the nation’s three key credit bureaus that track individuals’ credit histories, said late Wednesday that hackers breached a vulnerable spot in a U.S. website application called Apache Struts CVE-2017-5638. Equifax disclosed last week that it discovered in July that hackers had tapped a large trove of personal data on most adults in America.

But in a statement Thursday, Apache Software Foundation, which provides the application, said it provided and announced a patch for the software fault on March 7, well before Equifax said the security breach began in mid-May.

“In conclusion, the Equifax data compromise was due to their failure to install the security updates provided in a timely manner,” the foundation said.

Read more: http://www.ajc.com/business/equifax-software-maker-blame-each-other-for-opening-door-hackers/p5wJS5CgTLrmKUL59CTAjM/



Apache is a very common coding language used in websites. Vendors like Apache regularly release these security patches that the vast majority of companies implement in a timely manor. Equifax is in deep shit, IMO.
9 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

PoliticAverse

(26,366 posts)
1. "Apache is a very common coding language used in websites" - technically it's a web / HTTP server.
Thu Sep 14, 2017, 01:04 PM
Sep 2017
https://en.wikipedia.org/wiki/Apache_HTTP_Server

It's the most popular webserver with about 42% of sites on the Internet using it (it's free software):
https://news.netcraft.com/archives/2017/

CountAllVotes

(20,875 posts)
2. Screw them & their offer to monitor you for 1 year
Thu Sep 14, 2017, 01:04 PM
Sep 2017

You can use creditkarma.com for free. Try this instead is you need to find out what is going on with your record. I just checked mine and all is ... so far so good I hope!



TreasonousBastard

(43,049 posts)
3. Equifax can try to shift the blame all it wants to, but security is their responsibility...
Thu Sep 14, 2017, 02:03 PM
Sep 2017

Should be put out of business if they can't do the job.

CousinIT

(9,247 posts)
4. This is CLEARLY Equifax's fault for not patching their goddamned systems.
Thu Sep 14, 2017, 02:27 PM
Sep 2017

Full stop. Apache releases patches for any vulnerabilities quickly. If there's a CVE issued on the vulnerability and a patch available, IT. SHOULD. HAVE. BEEN. PATCHED.

N O

E XC U S E S

God DAMN these assholes.

HERE is where the vulnerability was documented: https://nvd.nist.gov/vuln/detail/CVE-2017-5638#vulnDescriptionTitle

Analysis Description
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 mishandles file upload, which allows remote attackers to execute arbitrary commands via a #cmd= string in a crafted Content-Type HTTP header, as exploited in the wild in March 2017.

Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

TeapotInATempest

(804 posts)
5. Exactly right.
Thu Sep 14, 2017, 02:42 PM
Sep 2017

I wonder what their excuse will be for not patching it? Two months should have been more than enough time and a large organization like Equifax should have the resources to do it.

Massacure

(7,525 posts)
6. It's not that black and white
Fri Sep 15, 2017, 12:15 AM
Sep 2017

Just because a patch gets release doesn't mean it gets implemented that day. A lot of companies have weekly or monthly maintenance windows and asking for downtime to reboot a server outside of those can be a dicey proposition for IT departments.

Even before a patch gets scheduled for installation during a maintenance window though, it's almost always going to have to go through a QA process of some sort. Most security patches pass with flying colors, but every once in a while you end up with something that requires you to go back to the vendor and ask for help. I've never worked with Apache, but I know service requests with Oracle can languish for weeks.

All that being said, know that I'm just playing devil's advocate here. Having worked in IT, I'm more inclined to believe that Equifax just dropped the ball.

TeapotInATempest

(804 posts)
7. I know
Fri Sep 15, 2017, 09:11 AM
Sep 2017

Vulnerability management is part of my job. I'm pretty sure someone dropped the ball here given that sensitive data was not adequately protected.

CousinIT

(9,247 posts)
8. I work in IT too. We are REQUIRED to apply critical patches within TWO WEEKS.
Fri Sep 15, 2017, 11:14 AM
Sep 2017

And we are NOT EVEN a bank or credit reporting agency.

They had MONTHS to test and apply this thing. At least two months before the breach happened. They house CRITICALLY sensitive personal data of millions - a responsibility which they clearly do not take seriously.

Again: NO excuses.

harun

(11,348 posts)
9. Apache isn't a coding language, it's a foundation that governs over many open source
Fri Sep 15, 2017, 04:15 PM
Sep 2017

software projects.

There is web server named Apache that is one of those projects. They were just lazy and or cheap about applying known security fixes.

Latest Discussions»Latest Breaking News»Equifax, software maker b...