Equifax Data Breach 2017: Timeline, Costs & Security Lessons

Equifax Data Breach 2017: Timeline, Costs & Security Lessons

Learn how to prevent catastrophic breaches like Equifax by understanding what went wrong.

• Attackers exploited an unpatched Apache Struts vulnerability and an expired security certificate to steal 147.9 million records over two months undetected.
• Chinese military attackers likely orchestrated the attack to build intelligence dossiers on U.S. citizens and government officials.
• The breach cost Equifax $1.38 billion in settlements and mandatory security improvements while destroying executive careers.
• Basic security failures caused this breach. Patch management and certificate renewals would have stopped it. So would network segmentation.

In 2017, Equifax suffered a data breach that exposed the personal information of 147.9 million Americans. That’s roughly 40% of the U.S. population.

The attackers exploited a known vulnerability that had a patch available for months. They remained undetected for 78 days because an SSL certificate had expired and nobody noticed. When Equifax finally discovered the intrusion, executives sold stock before going public.

The Equifax breach became a case study in how basic security failures led to catastrophic outcomes. Every failure was preventable with standard practices.

This analysis covers exactly how the attack unfolded and what security teams can learn to prevent similar breaches.

What Happened in the Equifax Data Breach?

The Equifax breach started with a web application vulnerability that had been public knowledge for months.

A data breach occurs when attackers gain unauthorized access to systems and steal sensitive information. Unlike data leaks from misconfigurations, breaches require attackers to actively exploit vulnerabilities to access protected systems.

On March 7, 2017, Apache disclosed CVE-2017-5638, a critical vulnerability in the Apache Struts web framework. The flaw allowed remote code execution through a malicious HTTP Content-Type header. Apache released a patch the same day.

Three days later, on March 10, attackers exploited this exact vulnerability on Equifax’s online dispute portal. The company’s security team received alerts about the patch but failed to apply it across all systems.

For the next two months, the attackers moved laterally through Equifax’s network. They found plaintext credentials stored on internal systems. These credentials gave them access to databases containing consumer financial records.

Between May and July 2017, the attackers exfiltrated data on 147.9 million people. They encrypted the stolen data to avoid detection by network monitoring tools.

Here’s why they got away with it for so long.

Why Did the Equifax Breach Go Undetected for 78 Days?

Equifax had network monitoring tools designed to detect exactly this type of data exfiltration. The tools were supposed to decrypt and inspect traffic leaving the network.

They weren’t working.

A critical SSL certificate had expired in January 2017. Without a valid certificate, the monitoring tools couldn’t decrypt traffic. The attackers’ encrypted exfiltration looked like normal HTTPS traffic.

Nobody noticed the expired certificate for over six months.

On July 29, 2017, administrators finally renewed the certificate. The monitoring tools immediately flagged suspicious activity. By then, the attackers had been inside for 78 days and stolen data on 40% of U.S. adults.

The GAO investigation report documented these failures in detail. Equifax had security tools but failed to maintain them.

Who Attacked Equifax?

This is where the Equifax breach gets interesting. The stolen data never showed up on dark web markets. That’s unusual for a financially motivated attack.

Attribution is the process of identifying who conducted a cyberattack based on technical evidence and attack patterns. Nation-state attackers typically don’t sell stolen data because their goal is intelligence gathering, not profit.

On February 10, 2020, the U.S. Department of Justice charged four members of China’s People’s Liberation Army with the Equifax hack. The indictment named Wu Zhiyong, Wang Qian, Xu Ke, and Liu Lei from PLA Unit 54398.

The evidence suggests Equifax was part of a broader Chinese intelligence operation. The 2015 Office of Personnel Management breach exposed 22 million federal employee records. The 2018 Marriott breach exposed 500 million hotel guest records. Neither dataset appeared on dark web markets.

Investigators believe China combined these datasets to build dossiers on U.S. government officials and intelligence officers. Financial records from Equifax reveal who has money problems and might be vulnerable to recruitment or blackmail.

The attackers were patient. They gained initial access in March but waited until May to begin data exfiltration. This patience is typical of nation-state operations focused on intelligence gathering rather than quick financial gain.

What Were the Key Impacts of the Equifax Breach?

The Equifax breach hit the company from every angle.

Financial Impact

The total cost of the breach reached $1.38 billion. This included:

Settlement costs: Equifax agreed to pay up to $700 million to settle with the FTC, CFPB, and 50 state attorneys general. The fund included $425 million for consumer compensation.

Security improvements: The settlement required Equifax to spend $1 billion improving its information security practices over five years.

Insurance recovery: Equifax had $125 million in cybersecurity insurance coverage, which it collected in full.

Stock impact: Equifax shares dropped 35% in the week following disclosure. The company’s market cap fell by $5 billion.

Executive Consequences

The breach ended multiple careers at Equifax:

  • CEO Richard Smith resigned in September 2017
  • CIO David Webb retired immediately after the breach
  • CSO Susan Mauldin retired days after the disclosure
  • Jun Ying (CIO of U.S. Information Solutions) was charged with insider trading for selling stock before the public announcement

Regulatory Changes

The breach triggered new requirements for credit bureaus:

  • Free credit freezes became mandatory nationwide (previously some states charged fees)
  • Annual credit report access expanded

Consumer Impact

For the 147 million affected individuals:

  • Increased risk of identity theft and fraud
  • Seven years of free credit monitoring through the settlement
  • Permanent exposure of Social Security numbers that can’t be changed

What Is the Equifax Data Breach Timeline?

Here’s exactly when each event occurred and how the attack progressed.

DateEvent
March 7, 2017Apache discloses CVE-2017-5638 and releases patch
March 10, 2017Attackers exploit vulnerability on Equifax dispute portal
May 13, 2017Attackers begin lateral movement and data exfiltration
July 29, 2017Expired SSL certificate renewed, suspicious activity detected
July 30, 2017Equifax takes their dispute portal offline
August 2017Multiple executives sell company stock
September 7, 2017Equifax publicly discloses the breach
September 26, 2017CEO Richard Smith resigns
February 10, 2020DOJ indicts four Chinese military officers

The 78-day detection gap matters. The average time to identify a breach is 207 days. Equifax was faster than average but still gave attackers nearly three months of access.

Equifax breach timeline showing how the attack unfolded

How Did Equifax Respond to the Breach?

Equifax’s incident response became a case study in what not to do.

Confusing websites: Equifax created equifaxsecurity2017.com to help affected consumers. The domain looked like a phishing site. Their social media team accidentally directed people to securityequifax2017.com, a parody site.

Waiving legal rights: The original terms on the response website required consumers to waive their right to sue in exchange for checking if they were affected. Equifax removed this after public backlash.

Executive stock sales: Several executives sold shares between learning about the breach and the public announcement. Only one was charged with insider trading.

Delayed notification: Equifax discovered the breach on July 29 but waited until September 7 to disclose it, a 40-day gap.

The FTC settlement website now handles consumer claims, not Equifax.

Equifax settlement website screenshot

What Security Lessons Can We Learn From the Equifax Breach?

The Equifax breach was entirely preventable. Here’s what security teams should take away.

Patch Faster

CVE-2017-5638 had a patch available for two months before the attack. Equifax’s security team was aware of it but didn’t apply it to all systems.

What to do differently:

  • Maintain an up to date asset inventory of all systems and their software versions
  • Set SLAs for patching critical vulnerabilities (24-48 hours for actively exploited CVEs)
  • Verify patches are actually applied, not just scheduled

Monitor Your Security Tools

Equifax had the right monitoring tools. They just weren’t working because of an expired certificate.

What to do differently:

  • Set alerts for expiring certificates months in advance
  • Monitor that your security tools are actually functioning
  • Run regular tests to verify detection capabilities work

Segment Your Network

Once attackers got inside, they moved freely through the network. Credentials found on one system gave access to many others.

What to do differently:

  • Implement network segmentation between systems with different sensitivity levels
  • Don’t store credentials in plaintext anywhere
  • Assume a breach will happen and design systems to limit lateral movement

Implement Zero Trust

The attackers used legitimate credentials to access sensitive databases. The systems had no way to distinguish between authorized and unauthorized use.

What to do differently:

  • Require multi-factor authentication for all sensitive system access
  • Monitor for unusual access patterns even from authenticated users
  • Implement least privilege so compromised accounts have limited reach

Don’t Store Credentials in Plaintext

Attackers found plaintext credentials on internal systems after getting in. Those credentials unlocked access to sensitive databases.

What to do differently:

  • Never store credentials in plaintext anywhere
  • Use a secrets management system
  • Rotate credentials if you find out they’ve been leaked or suspect compromise

How Does the Equifax Breach Compare to Other Major Breaches?

The Equifax breach ranks among the largest data breach examples in history.

By records exposed: Yahoo (3 billion), First American (885 million), and Marriott (500 million) exposed more records. But Equifax exposed Social Security numbers and financial data, making each record more damaging.

By financial impact: The $1.38 billion cost exceeds most breach settlements. Only the Capital One breach ($190 million fine plus remediation) and Yahoo ($117.5 million settlement) approach this scale.

By systemic importance: Equifax is one of three major credit bureaus. Unlike a retailer breach, consumers can’t choose to stop doing business with Equifax. The company has your data whether you want them to or not.

The breach shares common elements with other major incidents. Like the Target breach, attackers exploited vendor relationships and moved laterally through insufficiently segmented subnets. Like many breaches, basic security hygiene failures made this attack possible.

How Can You Protect Your Organization From Similar Breaches?

The Equifax breach succeeded because of multiple preventable failures. Here’s how to avoid the same fate.

Treat vulnerability management as critical infrastructure. Don’t just track patches, verify they’re applied. Run regular vulnerability scans and treat unpatched critical systems as incidents.

Monitor your monitoring. Security tools only work when they’re functioning. Build dashboards that show tool health, not just threat detections. Alert on monitoring gaps.

Assume a breach in your architecture. Design networks expecting attackers will get in. Segment sensitive systems. Monitor for lateral movement.

Watch for your credentials on the dark web. Attackers often obtain credentials from previous breaches before launching new attacks. Dark web monitoring detects exposed credentials so you can reset them before attackers exploit them.

Practice incident response. Equifax’s response made a bad situation worse. Run tabletop exercises. Have pre-approved communication templates. Know who makes decisions before a crisis hits.

How Can Breachsense Help Detect Credential Exposure?

The Equifax breach shows what happens when credentials aren’t protected. Attackers who get inside your network will hunt for credentials to expand their access.

Many attacks start with credentials leaked in previous breaches. Employees reuse passwords, and attackers exploit that. Breachsense monitors dark web markets and criminal forums for your organization’s credentials. When employee passwords appear in new breaches, you can reset them before attackers try using them.

Book a demo to see how credential monitoring fits into a layered security approach.

Equifax Data Breach FAQ

Attackers exploited an unpatched Apache Struts vulnerability (CVE-2017-5638) to access Equifax systems in March 2017. They moved laterally through the network and stole data on 147 million Americans over 78 days. The breach went undetected because an expired SSL certificate disabled network monitoring. Equifax disclosed the breach in September 2017.

Yes. Every failure that enabled this breach was preventable with standard security practices. Patching the Apache Struts vulnerability would have blocked initial access. Renewing the expired SSL certificate would have caught the exfiltration. Network segmentation would have limited lateral movement. None of these required advanced tools.

Most claimants who opted for cash received only $5-20, not the advertised $125. This happened because 4.5 million people filed claims against a capped $31 million fund. The settlement prioritized credit monitoring services over cash payments.

The U.S. Department of Justice indicted four members of China’s military (PLA Unit 54398) for the attack in February 2020. The stolen data never appeared on dark web markets, suggesting the attack was for intelligence gathering rather than financial gain.

CVE-2017-5638, a remote code execution vulnerability in Apache Struts. The flaw allowed attackers to execute commands via a malicious HTTP header. A patch was available two months before the breach, but Equifax hadn’t applied it.

78 days. Attackers gained initial access on March 10, 2017, and weren’t discovered until July 29, 2017. An expired SSL certificate disabled Equifax’s network monitoring tools, giving attackers free rein to exfiltrate data.

The attackers stole Social Security numbers, birth dates, and addresses. Around 200,000 people also had credit card numbers exposed. Some UK and Canadian residents were affected too.

Related Articles