Please enable JavaScript to view this website.

Equifax and the Unsustainable Status Quo

On Thursday, September 7, 2017, the credit reporting giant Equifax Inc. revealed that “highly sensitive personal and financial information for around 143 million U.S. consumers was compromised in an [ongoing] cybersecurity breach” that started as early as mid-May of 2017.1 According to Equifax, criminals were able to access, among other things, “the social security numbers, birth dates, and addresses” of consumers.2 The repercussions of such a far-reaching breach of critical personal information are clear—“more than half of all US residents who rely the most on bank loans and credit cards are now at a significantly higher risk of fraud and will remain so for years to come.”3 What is less clear, however, is how Equifax—aware of a system vulnerability months before the attack—failed to take any corrective action.

The site vulnerability through which hackers initially gained unauthorized access to Equifax’s internal server was known as “Apache Struts CVE-2017-5638.”4 Apache Struts is a web application “used across the Fortune 100 to [power websites], including Equifax’s public website.”5 Apache fixed the flaw on March 6, 2017—essentially announcing the flaw’s existence with its release of the fix—but Equifax nonetheless failed to install or update its own Apache application.6 That a company dealing almost exclusively in sensitive personal information would miss, or fail to monitor, such a vulnerability and subsequent fix for upwards of two months is difficult to fathom. Consider that only three days after Apache’s update “the [identified vulnerability] was already under mass attack by hackers [across the internet] who were exploiting the flaw to install rogue applications on web servers.”7

Indeed, it was not as though Equifax was unaware of general security vulnerabilities in its system. As far back as February 2017, Equifax was aware that identity thieves had been “feeding stolen Social Security numbers and other personal information into login pages for Equifax Workforce Solutions” in a different attack, thereby “downloading W-2 and other tax forms for dozens of employees of clients including [Whole Foods].”8 As a result, Equifax hired cybersecurity firm Mandiant to audit any internal security weaknesses related to the scams.9 During the course of the security audit, “Mandiant warned Equifax that its unpatched systems and misconfigured security policies could indicate major problems,” but there is no indication any remedial action was taken at that time, either.10

Altogether, it appears clear Equifax does not have the expertise or institutional competence necessary to adequately protect consumers’ private information. Consider that the very site Equifax set up in the wake of its breach announcement—to allow consumers to enter their names and Social Security Numbers to find out if they were affected—has been compromised.11 Equifax itself, through its official Twitter page, has on several occasions inadvertently directed consumers to “visit a knock-off website” mocking the company’s lackluster security practices.12

The question remains, then: how could this happen? How is it that the de facto keeper of vast swaths of sensitive consumer information could have been, and can continue to be, so careless and incompetent? The answer is simple: the consequences of a failure on this scale simply don’t weigh heavily enough to get companies like Equifax to pay attention.

The free market itself is not enough to police failures even of this magnitude. Although Equifax shares had substantially fallen from its pre-announcement price to an incredible low, the shares are already beginning to rebound.13 Some investors argue that “[o]ne of the best buying opportunities occurs when a company with an impressive track record [like Equifax] suffers a temporary setback that pummels its share price.”14 Indeed, it is well-recognized that “even the most significant recent breaches [like those at Target and Home Depot] had very little impact on the company’s stock price. Industry analysts have inferred that shareholders are numb to news of data breaches.”15

Where the forces of the free market offer no bite, neither does the law. It is a fact that “lawmakers at the state and federal level have been inexcusably lax about regulating [data firms like Equifax] and any others holding sensitive consumer information.”16 “Only eight states — Connecticut, Florida, Maine, New Mexico, Ohio, Rhode Island, Tennessee and Vermont — impose a firm deadline on how quickly companies must inform consumers of a breach, usually 30 to 90 days after its discovery.”17 More importantly, although Equifax “has amassed one of the most extensive and comprehensive databases of consumer financial data” it nonetheless operates free of the same stringent “legal and regulatory oversight that helps bolster data protection” in industries like banking.18

Indeed, Equifax is an undeserving beneficiary of a major gray area in the contemporary statutory scheme. The fact that most consumers “do not provide [their personal, sensitive] information directly to Equifax will [make] getting past the pleading (or motion to dismiss) stage even more difficult for some classes of plaintiffs [as] [v]irtually all data breach litigation has been brought by aggrieved consumers who claim they suffered harm after they gave their personally identifiable information directly to a company that got hacked.”19 Until the gap between the magnitude of responsibility companies like Equifax hold and the consequences of failure is minimized—through detailed legislation or otherwise—we need only wait for news of the next big breach.

  1. Gillian B. White, A Cybersecurity Breach at Equifax Left Pretty Much Everyone’s Financial Data Vulnerable, The Atlantic (Sept. 7, 2017),; see generally Equifax, Rick Smith, Chairman and CEO of Equifax, on Cybersecurity Incident Involving Consumer Data., YouTube (Sept. 7, 2017), (“The unauthorized access occurred between mid-May and July). 

  2. White, supra note 1. 

  3. Dan Goodin, Why the Equifax breach is very possibly the worst leak of personal info ever, ARS Technica (Sept. 8, 2017),

  4. Zack Whittaker, Equifax confirms Apache Struts security flaw it failed to patch is to blame for hack, ZDNet (Sept. 14, 2017),

  5. Id. 

  6. Cf. Goodin, supra note 3. 

  7. Dan Goodin, Failure to patch two-month-old bug led to massive Equifax breach, Ars Technica (Sept. 14, 2017),

  8. Michael Riley et. al., The Equifax Hack Has the Hallmarks of State-Sponsored Pros, Bloomberg Businessweek (Sep. 29, 2017),

  9. Id. 

  10. Id. 

  11. See Chris Morris, Was Equifax Hacked Again?, Fortune (Oct. 12, 2017),; Brian Krebs, Equifax Breach Response Turns Dumpster Fire, Krebs On Security (Sep. 17, 2017),

  12. Dan Goodin, Equifax sends breach vicims to fake notification site, Ars Technica (Sept. 20, 2017),

  13. See Wallace Witkowski, Equifax stock slapped after hack, but analysts say it is a short-term speed bump, MarketWatch (Sep. 8, 2017),

  14. Mark Hulbert, Opinion: Who has the guts to buy Equifax stock — and potentially make a killing?, MarketWatch (Oct. 13, 2017),

  15. Elena Kvochko & Rajiv Pant, Why Data Breaches Don’t Hurt Stock Prices, Harv. Bus. Rev. (Mar. 31, 2015),

  16. Michael Hiltzik, Here are all the ways the Equifax breach is worse than you can imagine, L.A. Times (Sept. 8, 2017),  

  17. Id. 

  18. Summer Danzeisen, Equifax Breach Highlights Regulatory Gaps in Data Privacy Protection, Geo. L. Tech. Rev. (Sept. 2017),

  19. Brenda R. Sharton & David S. Kantrowitz, Equifax and Why It’s So Hard to Sue a Company for Losing Your Personal Information, Harv. Bus. Rev. (Sep. 22, 2017),

The following two tabs change content below.

Kevin Kenney