Failing to patch a critical vulnerability in its Apache Struts software was not the only major security oversight committed by Equifax in the lead-up to a highly damaging data breach in 2017, according to a document filed as part of a securities fraud class-action lawsuit filed earlier this year.
An order and opinion filed last January by U.S. District Judge Thomas Thrash Jr. of the Northern District of Georgia alleges that the credit reporting agency failed to implement adequate authentication measures as well, as demonstrated by its reliance on the highly insecure username/password combination “admin/admin” to protect a portal used to manage credit disputes.
Yahoo! Finance has credited Buzzfeed reporter Jane Lytvynenko with initially reporting this and other excerpts from the court order in a series of tweets that resulted in a viral response and additional news reports. “The details from his Equifax class-action suit are BONKERS,” said Lytvynenko in one tweet.
In his court order and opinion, Judge Thrash Jr. denied a motion by defendants Equifax and former Equifax CEO Richard Smith to dismiss the lawsuit. He did, however, grant a dismissal for three other corporate officers: John Gamble, Jr., Rodolfo Ploder, and Jeffrey Dodge.
Other damaging allegations referenced in the judge’s opinion included Equifax’s lack of encryption when storing sensitive consumer data.
“According to the Amended Complaint, Equifax admitted that sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plaintext, making it easy for unauthorized users to read and misuse. Not only was this information unencrypted, but it also was accessible through a public-facing, widely used website. This enabled any attacker that compromised the website’s server to immediately have access to this sensitive personal data in plaintext,” the opinion stated, listing multiple citations. “It also failed to encrypt its highly vulnerable mobile applications, meaning that in addition to keeping sensitive data unencrypted in its own systems, it also failed to encrypt data being transmitted over the internet… And, when Equifax did encrypt data, it left the keys to unlocking the encryption on the same public-facing servers, making it easy to remove the encryption from the data.”
Equifax’s 2017 breach exposed the personal information of 148 million people. In July, it was announced that Equifax reached a settlement with the Federal Trade Commission, agreeing to pay between $330 million to $425 million to a restitution fund for victims.