{"id":84240,"date":"2017-09-21T12:38:10","date_gmt":"2017-09-21T16:38:10","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=84240"},"modified":"2017-09-21T12:38:10","modified_gmt":"2017-09-21T16:38:10","slug":"equifax-accidentally-directs-200000-customers-to-fake-phishing-website","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=84240","title":{"rendered":"Equifax Accidentally Directs 200,000 Customers To Fake Phishing Website"},"content":{"rendered":"<p><!--more-->ZeroHedge.com<\/p>\n<p>And the hits just keep coming for Equifax, the once-trusted credit-monitoring firm that has been embroiled in one of the biggest corporate public-relations disasters in recent memory since disclosing that hackers had penetrated its cyber security defenses and absconded with sensitive personal and financial data belonging to 143 million Americans. Because of the types of data that were stolen, including drivers&#8217; license, social security and credit-card numbers, experts have described the hack as possibly the most damaging corporate hack yet.<\/p>\n<p>As if this weren\u2019t enough to permanently sully the firm\u2019s reputation (amid cries of \u201cyou had one job!\u201d) \u2013 the staggering irony of a credit monitoring firm inadvertently divulging the sensitive information that it was supposed to safeguard hasn\u2019t been lost on consumers) a series of subsequent disclosures have portrayed the firm\u2019s executives as bungling, at best, and nefarious, at worst.<\/p>\n<p>In the nearly two weeks since the story broke\u2026<\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<ul>\n<li>It was revealed that three of the firm\u2019s executives, including its CFO, cashed out of stocks and options worth some $2 million in the month between when the company first learned about the hack, and when it was disclosed to the public. A federal prosecutor in Atlanta has opened a criminal investigation into Equifax that will focus both on whether the firm was criminally negligent in failing to patch a hole in its cybersecurity systems, as well as whether the suspect stock sales constitute securities fraud.<\/li>\n<li>The company\u2019s head of cyber security was revealed to have no background in computer science or security \u2013 a fact the company tried to hastily cover up by scrubbing her social-media profiles.\u00a0<a href=\"http:\/\/www.zerohedge.com\/news\/2017-09-15\/another-equifax-coverup-did-company-scrub-its-chief-security-officer-was-music-major\">Susan Mauldin,<\/a>\u00a0Equifax\u2019s chief information security officer, has a bachelor\u2019s degree in music composition and a master\u2019s in fine arts from the University of Georgia.<\/li>\n<li>Several Congressional committees have asked the company to turn over information relating to the hack as multiple investigations appear to be getting under way. The attorneys general of a handful of states, including Massachusetts and Rhode Island, have joined a probe into the company\u2019s handling of the breach.<\/li>\n<li>The company has been hit with dozens of lawsuits from consumers alleging fraud, abuse and negligence.<\/li>\n<li>Equifax CEO Rick Smith has been called to testify before a special House panel early next month.<\/li>\n<\/ul>\n<\/blockquote>\n<p>When Equifax first set up a website to allow consumers to check whether their information was compromised, it carried a waiver stating that by using the service consumers would forfeit the right to sue Equifax. The internet quickly exploded in outrage, and the company quickly clarified that the waiver didn\u2019t apply to this hacking incident, which\u2026sure. Now,\u00a0<a href=\"http:\/\/www.theverge.com\/2017\/9\/20\/16339612\/equifax-tweet-wrong-website-phishing-identity-monitoring\">The Verge<\/a>,<a href=\"http:\/\/www.nytimes.com\/2017\/09\/20\/business\/equifax-fake-website.html?_r=1\">\u00a0The New York Times\u00a0<\/a><strong>and a handful of other media outlets are reporting that Equifax accidentally tweeted the link to an imposter website set up by a white-hat hacker hoping to expose gllaring errors that the firm had made in setting up its verification website. This happened not once, but three times. And in at least one instance, the tweet with the phony link was left up for a whole day.<\/strong><\/p>\n<p><a href=\"http:\/\/www.zerohedge.com\/sites\/default\/files\/images\/user245717\/imageroot\/2017\/09\/18\/2017.09.21equifax.JPG\"><img decoding=\"async\" src=\"http:\/\/www.zerohedge.com\/sites\/default\/files\/images\/user245717\/imageroot\/2017\/09\/18\/2017.09.21equifax_0.JPG\" alt=\"\" \/><\/a><\/p>\n<p>Here\u2019s\u00a0<a href=\"http:\/\/www.theverge.com\/2017\/9\/20\/16339612\/equifax-tweet-wrong-website-phishing-identity-monitoring\">The Verge:<\/a><\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p>\u201cToday, Equifax ended up creating that exact situation on Twitter. In a tweet to a potential victim, the credit bureau linked to securityequifax2017.com, instead of equifaxsecurity2017.com. It was an easy mistake to make, but the result sent the user to a site with no connection to Equifax itself. Equifax deleted the tweet shortly after this article was published, but it remained live for nearly 24 hours.\u201d<\/p><\/blockquote>\n<p>Luckily for consumers, the fake site wasn\u2019t malicious. Instead, it was set up by developer Nick Sweeting to try and expose the glaring security vulnerabilities that the company had embedded in its recovery website, which it set up as a separate domain, rather than making it a subdomain of Equifax\u2019s main website.<\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p>\u201cLuckily, the alternate URL Equifax sent the victim to isn\u2019t malicious. Full-stack developer Nick Sweeting set up the misspelled phishing site in order to expose vulnerabilities that existed in Equifax&#8217;s response page.\u00a0<strong>\u201cI made the site because Equifax made a huge mistake by using a domain that doesn&#8217;t have any trust attached to it [as opposed to hosting it on equifax.com],\u201d\u00a0<\/strong>Sweeting tells The Verge.\u00a0<strong>\u201cIt makes it ridiculously easy for scammers to come in and build clones \u2014 they can buy up dozens of domains, and typo-squat to get people to type in their info.\u201d<\/strong><\/p><\/blockquote>\n<p>Sweeting says no data will leave his page and that he &#8220;removed any risk of leaking data via network requests by redirecting them back to the user&#8217;s own computer,&#8221; so hopefully data entered on his site is relatively safe. Still, Equifax&#8217;s team linked out to his page. That isn&#8217;t reassuring.\u201d<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Not only did they tweet the wrong link, they tweeted it 3 times. <a href=\"https:\/\/twitter.com\/hashtag\/Equihax?src=hash&amp;ref_src=twsrc%5Etfw\">#Equihax<\/a> <a href=\"https:\/\/t.co\/T8jrhSfhqw\">pic.twitter.com\/T8jrhSfhqw<\/a><\/p>\n<p>&mdash; Nick Sweeting (@thesquashSH) <a href=\"https:\/\/twitter.com\/thesquashSH\/status\/910562884639436800?ref_src=twsrc%5Etfw\">September 20, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Prior to Equifax customer service sharing the imposter site, Sweeting says he emailed the company\u2019s support team and tweeted to Equifax that he spotted a potential vulnerability. By the time the site was taken down,\u00a0<strong>Sweeting says it had received\u00a0<em>more than 200,000 hits.\u00a0<\/em>In the spirit of transparency, Sweeting included a disclaimer on his site warning consumers that it was a fake \u2013 and blasting Equifax for its sloppy security practices.<\/strong><\/p>\n<p>According to the\u00a0<a href=\"http:\/\/www.nytimes.com\/2017\/09\/20\/business\/equifax-fake-website.html?_r=1\">NYT<\/a>, phishers cannot create a page on the equifax.com domain, so if the website were hosted there instead, it would be easy for users to tell that the page was legitimate.<\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p><strong>\u201cFortunately for the people who clicked, Mr. Sweeting\u2019s website was upfront about what it was. The layout was the same as the real version, complete with an identical prompt at the top: \u201cTo enroll in complimentary identity theft protection and credit file monitoring, click here.\u201d<\/strong>\u00a0But a headline in large text differed: \u201cCybersecurity Incident &amp; Important Consumer Information Which is Totally Fake, Why Did Equifax Use A Domain That\u2019s So Easily Impersonated By Phishing Sites?\u201d<\/p><\/blockquote>\n<p>The legitimate Equifax domain was securityequifax2017.com. Sweeting\u2019s was equifaxsecurity2017.com. And as one cybersecurity expert told the NYT, even the legitimate website looks fake because it\u2019s not a subdomain of the larger Equifax site.<\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p>\u201cYou would think that would be the obvious place to start,\u201d said Rahul Telang, a professor of information systems at Carnegie Mellon University. \u201cCreate a subdomain so that if somebody tries to fake it, it becomes immediately obvious.\u201d<\/p><\/blockquote>\n<p>The company\u2019s actions, Telang told the NYT, suggest that it had never anticipated or planned for a breach.<\/p>\n<p>This has become clear in the last few weeks. Now, the only thing left to be decided is whether the fact that the company was almost comically unprepared for a hack rises to the level of criminal negligence.<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.zerohedge.com\/news\/2017-09-21\/equifax-accidentally-directs-200000-customers-fake-phishing-website\">http:\/\/www.zerohedge.com\/news\/2017-09-21\/equifax-accidentally-directs-200000-customers-fake-phishing-website<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-84240","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/84240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=84240"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/84240\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=84240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=84240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=84240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}