Reports

GAO Report shed the lights on the failures behind the Equifax hack

A new report from the U.S. Government Accountability Office (GAO) provides detailed information of the Equifax hack.

The Equifax hack occurred in May 2017 when attackers exploited the CVE-2017-5638 Apache Struts vulnerability in the Jakarta Multipart parser upload function.

The flaw allowed the attacker to make a maliciously crafted request to an Apache web server and gain access the underlying machine.

The credit reporting agency confirmed that a total of 145.5 million individuals have been exposed, hackers accessed names, social security numbers, dates of birth, addresses and, in some cases, driver’s license numbers and credit card numbers.

Now U.S. Government Accountability Office (GAO) published a report on the Equifax hack that includes further details on the incident. The report was commissioned by several U.S. senators and representatives, it is based on documents provided by Equifax itself and the cybersecurity consultants involved in the incident response and in the investigation. The reports also refers documents from the Internal Revenue Service (IRS), Social Security Administration (SSA), and U.S. Postal Service (USPS).

The report confirms that hackers targeted Equifax exploiting the Struts vulnerability, they made a reconnaissance a few days after the Struts flaw was publicly disclosed.

Equifax hackEquifax hack

The attackers breached an online dispute portal than queried internal databases in an effort to find personally identifiable information (PII).

“In July 2017, Equifax system administrators discovered that attackers had gained
unauthorized access via the Internet to the online dispute portal that maintained
documents used to resolve consumer disputes (see fig.). The Equifax breach
resulted in the attackers accessing personal information of at least 145.5 million
individuals.” states the report.

Equifax took 76 days to detect the massive 2017 data breach.

The experts highlighted that Equifax hack was the result of the failure of four major activities under the control of the security team, the identification, the detection, the segmenting of access to databases, and data governance.

The analysis of the log files revealed that attackers executed approximately 9,000 queries to access data containing PII.

9,000 queries run by the attackers is much more than the number of queries normally executes, highlighting the lack of control operated by the security team.

Equifax officials stated that the attackers were able to disguise their activity by blending in with regular network operations, the incident was detected by the security team during routine checks.

“As reported by Equifax, a network administrator conducting routine checks of the operating status and configuration of IT systems discovered that a misconfigured piece of equipment allowed attackers to communicate with compromised servers and steal data without detection.” continues the GAO Report.

“Specifically, while Equifax had installed a device to inspect network traffic or evidence of malicious activity, a misconfiguration allowed encrypted traffic to pass through the network without being inspected,”

The root cause of the problem was a digital certificate that had expired 10 months before the Equifax hack occurred, this circumstance allowed the attackers to exfiltrate data without being detected because the system was not able to inspect the traffic.

“Equifax stated that the misconfiguration was the result of an expired digital certificate that had not been replaced with a new certificate. Digital certificates are encrypted electronic tokens that are used to authenticate servers and systems. Because this one was expired, the system was unable to inspect encrypted traffic. The network
administrator replaced the expired certificate, allowing the system to resume inspection of traffic.” continues the report.

The lack of network segmentation allowed the attackers to access many internal databases along with the one behind the online dispute portal, experts also pointed out the credentials for accessing multiple archives were stored in plain text in one database accessed by the hackers.

However, many experts criticized the US authorities because even after the publication of the GAO report no real actions were taken against Equifax.

“One year after they publicly revealed the massive 2017 breach, Equifax and other big credit reporting agencies keep profiting off a business model that rewards their failure to protect personal information – and the Trump Administration and Republican-controlled Congress have done nothing.” stated Senator Elizabeth Warren, one of the officials who requested the GAO report.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Equifax hack, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…

24 minutes ago

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

10 hours ago

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

15 hours ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

1 day ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

1 day ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

1 day ago