
Insider Threat Indicators: How to Detect Internal Risks
Insider Threat Threat Intelligence Data Breach Prevention Security Operations
What Are Insider Threat Indicators? Security teams spend billions on perimeter defenses. Firewalls. EDR. Network …

Learn the most important lessons from one of the most catastrophic security attacks in history.
• The 2017 Equifax breach exposed 147.9 million Americans' data through an unpatched vulnerability and expired security certificate.
• Chinese military hackers likely orchestrated the attack to build intelligence dossiers on U.S. citizens and government officials.
• The breach cost Equifax $1.38 billion total, including settlements, regulatory fines, and mandatory security improvements.
• Key lessons include patching vulnerabilities promptly, implementing network segmentation, and maintaining basic security controls like certificate renewals.
In 2017, Equifax suffered a massive data breach, often considered one of the most significant and devastating cybersecurity incidents in history.
As one of the major credit reporting agencies in the United States, Equifax held sensitive information on more than 800 million individuals and 88 million businesses worldwide.
The breach exposed the personal data of more than 40% of the US population - approximately 147.9 million people. The leaked data included names, birth dates, physical addresses, and Social Security Numbers. Around 200,000 people also had their credit card numbers exposed.
In this case study, we’ll explore how the Equifax data breach happened, the company’s response, what the breach actually cost, and lessons learned.
Before we dive into the technical mess, let’s be clear about what we’re talking about here.
A data breach happens when attackers break into systems and steal data they’re not supposed to have. Think of it like someone breaking into your house and stealing your personal files - except it’s digital and affects millions of people at once.
Based on a report from the U.S. General Accounting Office, the Equifax data breach was caused by a combination of issues. On March 10, 2017, the attackers gained initial access to their network by exploiting the CVE-2017-5638 vulnerability on their online dispute portal.
This flaw let attackers send malicious code within a specially crafted HTTP content-type header, which was then executed on the Apache Struts server. Although a patch existed for this vulnerability, the security team didn’t apply it in time.
On May 13, 2017, the attackers pivoted to other servers within the network due to a lack of proper network segmentation. Once on the other machines, the attackers found plaintext credentials, which gave them access to even more servers.
From May - July 2017, the hackers accessed multiple databases containing sensitive information on hundreds of millions of people. When exfiltrating data, a widespread technique among cybercriminals is to encrypt data in transit to make it more difficult for their victim to discover the attack.
While Equifax had network monitoring tools that were supposed to decrypt, analyze, and re-encrypt the data, the monitoring tools didn’t work because of an expired TLS certificate. In other words, because Equifax didn’t renew their cert, encrypted traffic wasn’t being inspected. They had zero visibility into what data was leaving their network.
On July 29, 2017, the administrators renewed the expired certificate, at which point they immediately noticed the suspicious activity. At this point, the breach was discovered and an internal investigation was launched. On September 8, 2017, more than a month into the investigation, Equifax publicized the breach.
During the interim month of August, several Equifax executives sold company stock. The stock sell-off led to suspicions that they sold ahead of an impending price decline due to the breach. In the end, only the (former) chief information officer was charged with insider trading.

The Equifax breach had far-reaching impacts, from financial losses and reputational damage for the company to increased identity theft risks for consumers. Here are the main impacts from the breach:
This is where the story gets interesting. Attribution in cyberattacks isn’t always straightforward.
Threat actor attribution means figuring out who’s actually behind a cyberattack. It’s like detective work - you analyze attack patterns, technical evidence, and geopolitical context to identify whether you’re dealing with cybercriminals, nation-state actors, or insider threats.
Despite the large amount of data stolen, it never leaked onto the dark web. Another clue is that despite the initial access gained on March 10, 2017, it wasn’t until May 13, 2017, over two months later, that the attackers pivoted and started exfiltrating data.
Investigators believe the first attack was carried out by initial access brokers exploiting the recent Struts vulnerability. Eventually, they sold their access to more experienced attackers. In what the GAO report referred to as a “separate incident,” a different threat actor gained access to the online dispute portal on May 13, 2017, and used several techniques to retrieve the PII residing on other systems and exfiltrated that data.
On February 10, 2020, the United States Department of Justice charged four members of the Chinese military with the attack. Why would the Chinese government be interested in the data? In 2015, the U.S. Office of Personnel Management was hacked, leaking over 22.1 million records. In 2018, Marriott’s Starwood hotel chain was breached, leaking approximately 500 million records as well. In both incidents, the highly sensitive data was never sold or traded on the dark web. This led investigators to connect the three breaches.
The attacks are assumed to be an attempt by the Chinese government to build a dossier on millions of Americans with the intent to learn about U.S. government officials and intelligence officers. Specifically, the data leaked would shed light on individuals who could be manipulated due to financial trouble or blackmail attempts.
Equifax’s response to the breach was widely criticized for several reasons. Initially, they created a stand-alone domain titled equifaxsecurity2017.com to host information for those affected by the breach. The domain name looked suspicious as it’s the same style often used in phishing attacks. To make matters worse, Equifax’s official social media accounts mistakenly pointed users to a domain titled securityequifax2017.com.
What perhaps outraged people the most was that the original language used on the site required victims to waive their lawsuit rights to check whether they were affected. This was eventually updated. However, it’s certainly a good lesson in how not to respond to an incident.
Eventually, a new domain, with yet another confusing name, was created where you can check if you were affected:
https://eligibility.equifaxbreachsettlement.com/en/Eligibility.
It’s important to note that the FTC, not Equifax runs this website.
Equifax had a cybersecurity insurance policy with a coverage limit of $125 million and a deductible of $7.5 million at the time of the breach. The company stated, “We have received the maximum reimbursement under the insurance policy of $125 million, all of which was received before 2019.”
In 2019, Equifax settled with the FTC. While the breach was entirely preventable, in total the incident cost them $1.38 billion. The agreement required Equifax to set aside a minimum of $380.5 million for breach compensation and spend another $1 billion on improving its information security practices. As a direct result of the breach, the CEO, CSO, and CIO all parted ways with the company. Then, in June 2019, Moody’s downgraded Equifax’s financial rating due to the escalating litigation and regulatory costs associated with the breach.
The settlement offered free credit monitoring or up to $125 cash payment. Claimants who submitted a valid claim for credit monitoring services received an email with information on how to activate credit monitoring services with Experian. Victims were also eligible for at least seven years of free identity restoration services to help them with the effects of identity theft and fraud.
Victims could claim out-of-pocket losses (excluding losses of money and time spent freezing or unfreezing credit reports or purchasing credit monitoring or identity theft protection) by providing documentation, but depending on the number of claims filed, the amount paid out is usually reduced.
After the breach, U.S. lawmakers passed a law allowing consumers to freeze their credit reports at no cost. Until then, in some states, consumers had to pay for a credit freeze, restricting access to a person’s credit file. A credit freeze makes it harder for identity thieves to open accounts in someone else’s name, which can damage their credit score.

Hopefully, our Equifax case study was informative. Here are our top takeaways from the data breach:
Attackers exploited an unpatched Apache Struts vulnerability (CVE-2017-5638) to breach Equifax’s systems in 2017. They accessed personal data on 147 million Americans including SSNs, birthdates, and addresses. The breach went undetected for months because an expired security certificate stopped their monitoring tools from working.
Check the official settlement website at equifaxbreachsettlement.com or use Breachsense’s exposure scanner to see if your data appears in breach databases. With 147 million people affected, you should assume you were hit if you had credit history before 2017.
Most Equifax claimants who opted for cash got only $5-20, not the advertised $125. This happened because 4.5 million people filed claims against a capped $31 million fund. The settlement prioritized credit monitoring over cash payments.
Use dark web monitoring services to continuously scan for your exposed credentials. You can also check HaveIBeenPwned for known breaches or use Breachsense’s scanner for comprehensive dark web exposure assessment including recent breaches.
Watch for unauthorized accounts on your credit reports, unexpected credit inquiries, or bills for services you didn’t sign up for. Monitor your credit reports from all three bureaus (Equifax, Experian, TransUnion) and consider data breach monitoring to catch future exposures early.
Freeze your credit at all three bureaus immediately, file a fraud alert, and monitor your credit reports closely. Consider identity theft protection services and watch for fraudulent accounts. Since you can’t change your SSN, you’ll need to stay vigilant permanently.

Insider Threat Threat Intelligence Data Breach Prevention Security Operations
What Are Insider Threat Indicators? Security teams spend billions on perimeter defenses. Firewalls. EDR. Network …

Indicators of Compromise IOC Threat Intelligence Dark Web Monitoring Cybersecurity Breach Detection
IOCs work. But they work after the fact. By the time you find a malicious file hash or C2 beacon, attackers have already …