The Equifax Breach from a Geo Political Perspective

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

The Equifax breach stole names, addresses, birth dates, and credit card numbers for over 200,000 consumers.  One might immediately assume that cyber criminals made the attack in order to sell the information to identity thieves who will run up fraudulent charges, file fake tax returns, defraud mortgages and loans, purchase goods with stolen credit cards or steal a subscription to HBO in time for next season’s Game of Thrones.  

But where most see thieves, I see spies.  

The cyber intrusion also stole documents used in disputes for approximately 182,000 people.  This includes personal identifiable information that sophisticated attackers could use to gain entry into medical records, bank accounts, employer email accounts and networks – virtually anywhere that a person has an online presence.  Most consumers are still slow to adopt secondary protection schemes like 2-factor authentication and continue to use challenge questions that relate directly to their personal lives.  If a spy agency in China, North Korea or Russia (the three most likely culprits in the Equifax breach) has this information, they could use it to infiltrate other accounts of targeted individuals, particularly those persons of interest in government agencies.  

I’m especially concerned as we move toward elections in 2018 and 2020 that this breach, together with the two massive Yahoo breaches during the second half of last year, may lead to additional compromises like the ones that plagued the democrats before the Presidential election in 2016.  If spies are behind this attack, we should expect to see additional releases of damaging personal information, more fake news grounded in a kernel of truth and significant disruptions that erode trust.  Wikileaks is likely poised and ready to help foreign spies further damage US democracy.

Cyber warfare often drives an information narrative.  Cyber espionage collects information.  Spy agencies typically hold that information close to the vest, using it to quietly inform decisions and tactically pressure certain international politics.  Sometimes the information is used to feed the narrative most beneficial to the Nation that stole it.  After the DNC attack, Russia positioned the most damaging information to the Clinton campaign on Wikileaks. The influence campaign against the United States election did not stop there. Russia blended covert intelligence operations with outreach through state and private media, and paid social media trolls and official news stories to establish a narrative that the United States election system was compromised at best and at worst, corrupt.  

As a corollary issue to the breach, it is one thing to wake up and realize that your Yahoo account was compromised.  It’s another entirely to find out that one of the institutions that we trust to protect our most critical information failed us.  I’ve long felt uncomfortable with the amount of information that the three big credit agencies collect and store about consumers.  As an investigator, I understand the need for rapid credit checks that seek to determine the financial stability of a consumer, but when we give others control over our information, we open ourselves to these major attacks.  Unfortunately, even after the massive attacks on OPM, Yahoo and now Equifax, we’ve still only seen the tip of the spear.

Complex security together with people knowledgeable in counterintelligence is required to protect systems from the biggest flaw in any design—the people who use them.  Corporations hoard big data mined from consumer information freely given under rarely read privacy notices, vacuumed up from social media, collected from Internet searches and website visits and distilled from the news and media we consume.  Spies thrive by accessing this wealth of information by bypassing cybersecurity through non-technical approaches like phishing emails and social engineering hacks.  A top down approach from government policy and investment to corporate responsibility and individual security is necessary to protect our identities from cyber abuse. Anything short of that lays our information out in a banquet for cyber thieves and spies.

The post The Equifax Breach from a Geo Political Perspective appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
153 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel