Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/11/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Equifax Gets Slammed, Removes Forced Arbitration Clause from Credit Monitoring Offer

Company's initial requirement that breach victims sign away their legal rights to get complimentary offer was one of several mistakes.

Equifax Monday announced changes to its free credit-monitoring offer for victims of the massive data breach it disclosed last week, after getting slammed for originally attempting to force people to sign over their rights to legal recourse in order to enroll.

In a breach update, Equifax said it has removed certain language from the Terms of Use on the third-party website victims have to use to sign up for the credit monitoring service. It has also added a FAQ to its own website to confirm that enrolling in the complimentary credit monitoring offer does not waive any rights to take legal action against the company.

Earlier, consumer advocacy groups such as Public Citizen, New York Attorney General Eric Schneiderman, the Consumer Financial Protection Bureau, and Sen. Sherrod Brown (D-Ohio) were among many who had demanded that Equifax remove the forced arbitration clause in its original credit monitoring offer. The clause basically prohibited people who signed up for the offer from later suing the company in court.

"The wounds were totally self-inflicted," says Bob Ackerman, a managing director at cybersecurity venture firm Allegis Capital. "The debacle of perceived release of liability, if you opted in to their credit-watch services was just pure stupidity."

In addition to acquiescing to the demand to remove the clause, Equifax said it would also not require a consumers' credit card information when they sign up for the offer. Neither will consumers be automatically enrolled or charged at the end of the free period, the company said. There had been some concern over both requirements when Equifax originally announced the complimentary credit-monitoring offer — particularly over the prospect that the company could actually end up making money over the breach.

"We are listening to issues consumers have experienced and their suggestions. These are helping to further inform our actions," the company noted in Monday's update.

Equifax's moves to soothe frayed tempers, while some might see as a positive development, is unlikely to do much to mitigate the fallout from the breach.

In the four days since Equifax announced the breach, the company's shares have fallen by over 20%, erasing billions of dollars in market value in the process. From around $142.70 last Thursday, Equifax's share price had tumbled to around $111.30 about 90 minutes before market close Monday. Some financial experts expect prices will fall even further to around $100 by mid-October.

Schneiderman, and attorneys general from Connecticut, Illinois, Pennsylvania, Massachusetts, and other states already have launched investigations or have announced their intention to do so soon.

It is almost a sure bet that Equifax will need to respond to similar investigations from every single state AG. Among the issues they will probe is the 40-day delay between when Equifax first discovered the breach and when it first publicly disclosed the incident and whether the post-breach measures it is taking to protect consumers are adequate.

News that three senior Equifax executives sold nearly $2 million worth of their shares in the company in the days immediately following breach discovery has added to concerns about the company's commitment to addressing what went wrong.

Multiple lawsuits already have been filed over the breach, including one in Portland, Oregon, which seeks a mind-boggling $70 billion in damages nationwide.

On Monday two high-ranking lawmakers—Senators Orrin Hatch (R-Utah) and Ron Wyden (D-Oregon)—announced the first of what is sure to be multiple inquiries into the impact of the incident on U.S. agency records. The two Senators also wanted to know when exactly the three Equifax executives who sold their stock were first informed of the breach.

"Equifax has made a number of critical missteps, which have caused the public to question whether or not they truly have the best interests of their customers at heart," says Michael Sutton, CISO of ZScaler. "Whether it's the Equifax executives selling shares days after the discovery of the breach…or profiting from the breach by pushing a credit monitoring service that they own, the optics have been horrible."

Equifax had plenty of time to prepare a better response, Sutton says. The company should have known there would be a tsunami of concern following the breach disclosure and put in place measures for handling questions from concerned consumers.

"Equifax badly bungled the release of the website meant to provide answers. There were initially connectivity problems, and once it came online, it provided limited and sometimes contradictory information, even responding to nonsense requests," Sutton notes. The website was a critical component of the communication strategy and should have been thoroughly vetted before it went live.

Chris Pogue, global head of security at Nuix, predicts that the data compromise will likely result in the biggest class-action lawsuit in data breach history. "They'll probably debate the defensible position of reasonableness, which asks, 'Did Equifax do what was reasonable to protect this data?'" Pogue says. "In my opinion, they would be hard-pressed to find a security expert who says they took those steps." 

All of the public statements that Equifax has made about the breach so far are likely carefully vetted by lawyers because the company knows it is going to court over this. So, when the full details emerge, things are going to get far worse for Equifax, Pogue predicts.

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/13/2017 | 2:52:04 PM
Too stupid to believe
I have found an article on linkedin indicative that an Equifax website based in Argentina (and limited thereto) was secured by the highly innovative user-password combination of ...... sitting down security professionals?  Have a strong drink at the side???

Here: admin / admin

True.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.