{"id":13649,"date":"2017-09-24T10:15:16","date_gmt":"2017-09-24T14:15:16","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=13649"},"modified":"2017-09-24T10:20:36","modified_gmt":"2017-09-24T14:20:36","slug":"equifax-does-it-again-almost-a-lesson-to-be-learned","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/equifax-does-it-again-almost-a-lesson-to-be-learned\/","title":{"rendered":"Equifax Does it Again [Almost]: A lesson to be learned"},"content":{"rendered":"<h1>Equifax Does it Again [Almost]:\u00a0 A lesson to be learned<\/h1>\n<p>The <a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/143-million-u-s-consumers-affected-by-equifax-data-breach\/\" target=\"_blank\" rel=\"noopener\"><strong>Great Equifax Breach of 2017<\/strong><\/a>, allowed hackers to obtain sensitive information from approximately 143 million U.S. consumers. In order &#8220;to assist&#8221; victims of the attack, Equifax set up a website where people could go learn whether or not they were affected by the breach.<\/p>\n<p>Around the same time, a developer, <a href=\"https:\/\/twitter.com\/thesquashSH\">Nick Sweeting<\/a>, from Full Stack, set up a phishing site (an Equifax clone) to show just how easy it is for savvy hackers to set up sites that look like their legitimate counterparts, but are actually constructed to trick users into voluntarily giving up sensitive personal information.<\/p>\n<p>According to <em>The Verge , <\/em>Sweeting said:<\/p>\n<blockquote><p><em>&#8220;I made the site because Equifax made a huge mistake by using a domain that doesn&#8217;t have any trust attached to it [as opposed to hosting it on equifax.com],\u201d Sweeting tells The Verge. \u201cIt makes it ridiculously easy for scammers to come in and build clones \u2014 they can buy up dozens of domains, and typo-squat to get people to type in their info.\u201d Sweeting says no data will leave his page and that he &#8220;removed any risk of leaking data via network requests by redirecting them back to the user&#8217;s own computer,&#8221;\u00a0<\/em><\/p><\/blockquote>\n<p>According to Sweeting, any information entered by visitors on that fake page is safe. Still, that doesn&#8217;t excuse Equifax from linking to a misspelled version of its own page &#8211; which happened, luckily for those who visited it, a harmless phishing page.\u00a0 Let this remind you of just how easy it is to set up a phishing site that looks exactly like the real site. According to Sweeting, <strong><em>it only took him about 20 minutes to clone the Equifax site.<\/em><\/strong><\/p>\n<h3>And there&#8217;s a lesson to be learned here:<\/h3>\n<p>Whenever you are on a web site that asks you to input sensitive, personal information like your social security number, your street address, your credit card number(s), driver&#8217;s license number, or any other sensitive personal information, MAKE SURE YOU&#8217;RE ON THE CORRECT SITE. You can&#8217;t count on anyone else to keep you safe, you can&#8217;t count on any software program to keep you safe, you have to rely on your own good common sense. Take your time and verify before entering sensitive information on any website.<\/p>\n<p>If you&#8217;re interested in learning more about this, here&#8217;s an excerpt from article from <em>The Verge.<\/em> There&#8217;s a link to the entire article at the end. Great reading.<\/p>\n<blockquote>\n<h2><a href=\"https:\/\/www.theverge.com\/2017\/9\/20\/16339612\/equifax-tweet-wrong-website-phishing-identity-monitoring\" target=\"_blank\" rel=\"noopener\">For weeks, Equifax customer service has been directing victims to a fake phishing site<\/a><\/h2>\n<p>&#8230; Full-stack developer <a href=\"https:\/\/twitter.com\/thesquashSH\">Nick Sweeting<\/a> set up the misspelled phishing site in order to expose vulnerabilities that existed in Equifax&#8217;s response page. \u201cI made the site because Equifax made a huge mistake by using a domain that doesn&#8217;t have any trust attached to it [as opposed to hosting it on equifax.com],\u201d Sweeting tells <em>The Verge<\/em>. \u201cIt makes it ridiculously easy for scammers to come in and build clones \u2014 they can buy up dozens of domains, and typo-squat to get people to type in their info.\u201d Sweeting says no data will leave his page and that he &#8220;removed any risk of leaking data via network requests by redirecting them back to the user&#8217;s own computer,&#8221; so hopefully data entered on his site is relatively safe. Still, Equifax&#8217;s team linked out to his page.<\/p>\n<p id=\"QK3O0B\">Earlier this month, hackers <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=6&amp;ved=0ahUKEwjTqY-gnbTWAhWG3SYKHUJzAlAQFghDMAU&amp;url=https%3A%2F%2Fwww.theverge.com%2F2017%2F9%2F7%2F16270808%2Fequifax-data-breach-us-identity-theft&amp;usg=AFQjCNEXpvh8ZxoJCBB9VpAsdE32gL-mSA\">broke into Equifax&#8217;s servers<\/a> and stole 143 million people&#8217;s personal information, including their Social Security numbers. In response to the attack, Equifax set up a website \u2014 <a href=\"http:\/\/www.equifaxsecurity2017.com\/\">www.equifaxsecurity2017.com<\/a> \u2014 for possible victims to verify whether they&#8217;re affected. Because the process involves sharing sensitive information, consumers have to trust they&#8217;re entering their data in the right place, which can be tricky because the breach-recovery site itself isn\u2019t part of <a href=\"https:\/\/go.redirectingat.com?id=66960X1514734&amp;xs=1&amp;url=http%3A%2F%2Fequifax.com\" target=\"_blank\" rel=\"nofollow noopener\">equifax.com<\/a>. If users end up on the wrong site, they could end up leaking the data they&#8217;re already concerned was stolen.<\/p>\n<p id=\"42kyQm\">Today, Equifax ended up creating that exact situation on Twitter. In a tweet to a potential victim, the credit bureau linked to <a href=\"http:\/\/securityequifax2017.com\">securityequifax2017.com<\/a>, instead of <a href=\"http:\/\/equifaxsecurity2017.com\">equifaxsecurity2017.com<\/a>. It was an easy mistake to make, but the result sent the user to a site with no connection to Equifax itself. Equifax deleted the tweet shortly after this article was published, but it remained live for nearly 24 hours&#8230;<\/p>\n<\/blockquote>\n<p><strong><a href=\"https:\/\/www.theverge.com\/2017\/9\/20\/16339612\/equifax-tweet-wrong-website-phishing-identity-monitoring\" target=\"_blank\" rel=\"noopener\">Read the entire article here<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Equifax Does it Again [Almost]:\u00a0 A lesson to be learned The Great Equifax Breach of 2017, allowed hackers to obtain sensitive information from approximately 143 million U.S. consumers. In order &#8220;to assist&#8221; victims of the attack, Equifax set up a website where people could go learn whether or not they were affected by the breach. Around the same\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/equifax-does-it-again-almost-a-lesson-to-be-learned\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,1426,1670,1680,1656,1674],"tags":[792,161,331,14],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/13649"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=13649"}],"version-history":[{"count":4,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/13649\/revisions"}],"predecessor-version":[{"id":13654,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/13649\/revisions\/13654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13650"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=13649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=13649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=13649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}