Jump to content

Equifax used 'admin' as username and password for sensitive data: lawsuit

Flying Sausages

https://finance.yahoo.com/news/equifax-password-username-admin-lawsuit-201118316.html

Quote

Equifax (EFX) used the word “admin” as both password and username for a portal that contained sensitive information, according to a class action lawsuit filed in federal court in the Northern District of Georgia.

The ongoing lawsuit, filed after the breach, went viral on Twitter Friday after Buzzfeed reporter Jane Lytvynenko came across the detail.

“Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes, a password that ‘is a surefire way to get hacked,’” the lawsuit reads.

The lawsuit also notes that Equifax admitted using unencrypted servers to store the sensitive personal information and had it as a public-facing website.

When Equifax, one of the three largest consumer credit reporting agencies, did encrypt data, the lawsuit alleges, “it left the keys to unlocking the encryption on the same public-facing servers, making it easy to remove the encryption from the data.”

The class-action suit consolidated 373 previous lawsuits into one. Unlike other lawsuits against Equifax, these don’t come from wronged consumers, but rather shareholders that allege the company didn’t adequately disclose risks or its security practices.

You think company storing your data in a plain text with no encryption is bad for security practice? Well, using "admin" for username and password login is also another bad security practice too. No surprise that even big company like Equifax is using "admin" for username for username and password login information. How can you be this bad just to protect consumer information? Data breach from software exploit or vulnerability or zero day is another story, but data breach from using "admin" as login information is just way too stupid that you can prevent it in less than 10 minutes just to change the username and password.

Link to comment
Share on other sites

Link to post
Share on other sites

That's what happens when you cut costs on security

and hire cheap A$$ staff that don't care about their job due to the low salary they get.

 

 

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

Years of studying computers and you use the most basic password? Omega brain.

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

Theres so many problems with this its honestly beyond a joke.

 

Who keeps a private database on a public facing webserver anyway? Why wasn't the subdomain locked? What moron chose admin for a username and password?

 

Fairly obviously whoever set this up for them had no fucking clue. I'm hardly an expert on webservers but even I know about .htaccess. It's really not difficult to hide a subdomain from the public internet and make it local only.

 

Mind you, they probably would have used admin for the username and password in the .htaccess file anyway.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, Vishera said:

That's what happens when you cut costs on security

and hire cheap A$$ staff that don't care about their job due to the low salary they get.

 

 

But then you demand cheap products so what goes around comes around. 

Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, TempestCatto said:

That's like having one of those fake rocks to hide a house key in, but instead of blending it in with your front garden, you just leave it under the door mat.

More like you leave it in a giant plastic key, with the words "if you forget, key in here" on the doorstep.

Link to comment
Share on other sites

Link to post
Share on other sites

using admin/admin as your login credentials is not necessairly bad. The bad part is when you have it on a public facing server.

Link to comment
Share on other sites

Link to post
Share on other sites

Why am I not surprised...

 

Related image

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

20 minutes ago, rcmaehl said:

Why am I not surprised...

This is exactly why the tech industry (SPECIFCIALLY security) is in such a sorry state right now. This shit is everywhere and it's all going to hit the fan at some point.

Link to comment
Share on other sites

Link to post
Share on other sites

THIS IS WHY IM TRYING TO GET INTO IT!! So I can do better than that!! The industry needs THE BEST

Moist

Link to comment
Share on other sites

Link to post
Share on other sites

Good Gods, I should be making a killing as a security consultant if this is the kind of nonsense that these companies are engaging in.

乇乂丅尺卂 丅卄工匚匚

Link to comment
Share on other sites

Link to post
Share on other sites

20 minutes ago, The_Prycer said:

Good Gods, I should be making a killing as a security consultant if this is the kind of nonsense that these companies are engaging in.

You have NO idea.

 

There's at least a dozen places I refuse to shop due to lack of security. The number of stores that put POS systems on the same VLAN as other devices, or even don't use VLANs at all, is too damn high.

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, rcmaehl said:

Why am I not surprised...

 

Related image

That's not the problem,

The problem is that she did nothing to prevent this,if she did anything at all,

She is probably talking on the phone all day with friends while in the office eating donuts.

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

Doesn't every decent IT system have minimum password requirements???

 

Equifax is simply a joke after this, how on earth can anyone trust them with any data going further when they can not even meet the standards for every single online account I hold for internal accounts. 

Main Machine:  16 inch MacBook Pro (2021), Apple M1 Pro (10 CPU, 16 GPU Core), 512GB SDD, 16GB RAM

Gaming Machine:  Acer Nitro 5, Core i7 10750H, RTX 3060 (L) 6GB, 1TB SSD (Boot), 2TB SSD (Storage), 32GB DDR4 RAM

Other Tech: iPhone 15 Pro Max, Series 6 Apple Watch (LTE), AirPods Max, PS4, Nintendo Switch, PS3, Xbox 360

Network Gear:  TP Link Gigabit 24 Port Switch, TP-Link Deco M4 Mesh Wi-Fi, M1 MacMini File & Media Server with 8TB of RAID 1 Storage

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, LAwLz said:

using admin/admin as your login credentials is not necessairly bad. The bad part is when you have it on a public facing server.

Yes, it is bad - because it is the default. They didn't exactly explain the whole nature of the setup, but this sounds like the default configuration of a lot of NAT devices, from home routers up to enterprise web servers. Chances are, the login was default, and the remote administration option was on by default, and left on. It takes literally seconds to change that configuration so you have a non-default password and remote administration is turned off. People commonly fail to do this on their home routers, but for an enterprise to do it is pathetic.

Link to comment
Share on other sites

Link to post
Share on other sites

You could hire high school students to do a better job than that security wise.

Please quote my post, or put @paddy-stone if you want me to respond to you.

Spoiler
  • PCs:- 
  • Main PC build  https://uk.pcpartpicker.com/list/2K6Q7X
  • ASUS x53e  - i7 2670QM / Sony BD writer x8 / Win 10, Elemetary OS, Ubuntu/ Samsung 830 SSD
  • Lenovo G50 - 8Gb RAM - Samsung 860 Evo 250GB SSD - DVD writer
  •  
  • Displays:-
  • Philips 55 OLED 754 model
  • Panasonic 55" 4k TV
  • LG 29" Ultrawide
  • Philips 24" 1080p monitor as backup
  •  
  • Storage/NAS/Servers:-
  • ESXI/test build  https://uk.pcpartpicker.com/list/4wyR9G
  • Main Server https://uk.pcpartpicker.com/list/3Qftyk
  • Backup server - HP Proliant Gen 8 4 bay NAS running FreeNAS ZFS striped 3x3TiB WD reds
  • HP ProLiant G6 Server SE316M1 Twin Hex Core Intel Xeon E5645 2.40GHz 48GB RAM
  •  
  • Gaming/Tablets etc:-
  • Xbox One S 500GB + 2TB HDD
  • PS4
  • Nvidia Shield TV
  • Xiaomi/Pocafone F2 pro 8GB/256GB
  • Xiaomi Redmi Note 4

 

  • Unused Hardware currently :-
  • 4670K MSI mobo 16GB ram
  • i7 6700K  b250 mobo
  • Zotac GTX 1060 6GB Amp! edition
  • Zotac GTX 1050 mini

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, Kenji the Uke said:

THIS IS WHY IM TRYING TO GET INTO IT!! So I can do better than that!! The industry needs THE BEST

Same here. This is absolutely pathetic.

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, Euchre said:

Yes, it is bad - because it is the default. They didn't exactly explain the whole nature of the setup, but this sounds like the default configuration of a lot of NAT devices, from home routers up to enterprise web servers. Chances are, the login was default, and the remote administration option was on by default, and left on. It takes literally seconds to change that configuration so you have a non-default password and remote administration is turned off. People commonly fail to do this on their home routers, but for an enterprise to do it is pathetic.

Agreed.

 

8 hours ago, LAwLz said:

using admin/admin as your login credentials is not necessairly bad. The bad part is when you have it on a public facing server.

Is it okay to setup AD Servers with the admin/admin login combo because it's internal?

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, Euchre said:

Yes, it is bad - because it is the default. They didn't exactly explain the whole nature of the setup, but this sounds like the default configuration of a lot of NAT devices, from home routers up to enterprise web servers. Chances are, the login was default, and the remote administration option was on by default, and left on. It takes literally seconds to change that configuration so you have a non-default password and remote administration is turned off. People commonly fail to do this on their home routers, but for an enterprise to do it is pathetic.

It might not be that bad, depending on what other security measurements you have in place.

 

 

7 minutes ago, Leviathan- said:

Is it okay to setup AD Servers with the admin/admin login combo because it's internal?

Preferably not, but depending on what other security measurements are in place it might not be THAT bad.

On an AD server it's definitely not recommended, insider threats are a thing, but "the login was admin/admin" is not automatically the greatest sin ever. If you have proper security in place, then there are already several things which need to be compromised before you even get to the login page.

For example it's recommended to use a jump server to access administrative things. If I sit at my computer at work, I can't reach our networking equipment. In order to do that, I need to VPN into a specific network, and then I need to login to a jump server, and then I can login to our networking gear. So I have 3 things I need username and password for in order to access something. It wouldn't be a catastrophe if the last one was admin/admin.

If you ask me, the biggest problem with using admin/admin in a setup like at my work isn't that some unauthorized person can guess the password, it's that you can't do proper accounting if everyone uses the same login.

 

 

And let's be clear, I am not saying it's a good idea to use admin/admin. What I am saying is that it's not automatically as massive of a fuckup as you might think, assuming other things are in place.

Enterprise networks are generally not configured like a home network where everyone can reach everything. They are (or should be) more locked down and secure than that.

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, Leviathan- said:

Is it okay to setup AD Servers with the admin/admin login combo because it's internal?

Sure! Also, you should see about an IT job with Target!

 

(For those that don't know, in 2013 Target suffered a major data breach because a 3rd party login allowed access to the ENTIRE internal network, including that for the POS [Point Of Sale] systems, including the card readers that the hackers were able to exploit to capture 41-70 million debit and credit cards. Everyone from the Pepsi vendor to the CEO had the same level of network access.)

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, LAwLz said:

It might not be that bad, depending on what other security measurements you have in place.

 

 

Preferably not, but depending on what other security measurements are in place it might not be THAT bad.

On an AD server it's definitely not recommended, insider threats are a thing, but "the login was admin/admin" is not automatically the greatest sin ever. If you have proper security in place, then there are already several things which need to be compromised before you even get to the login page.

For example it's recommended to use a jump server to access administrative things. If I sit at my computer at work, I can't reach our networking equipment. In order to do that, I need to VPN into a specific network, and then I need to login to a jump server, and then I can login to our networking gear. So I have 3 things I need username and password for in order to access something. It wouldn't be a catastrophe if the last one was admin/admin.

If you ask me, the biggest problem with using admin/admin in a setup like at my work isn't that some unauthorized person can guess the password, it's that you can't do proper accounting if everyone uses the same login.

 

 

And let's be clear, I am not saying it's a good idea to use admin/admin. What I am saying is that it's not automatically as massive of a fuckup as you might think, assuming other things are in place.

Enterprise networks are generally not configured like a home network where everyone can reach everything. They are (or should be) more locked down and secure than that.

Now that is how you should of followed up with your original comment ?. Sounds like you guys are following a good standard. 

 

1 hour ago, Euchre said:

Sure! Also, you should see about an IT job with Target!

 

(For those that don't know, in 2013 Target suffered a major data breach because a 3rd party login allowed access to the ENTIRE internal network, including that for the POS [Point Of Sale] systems, including the card readers that the hackers were able to exploit to capture 41-70 million debit and credit cards. Everyone from the Pepsi vendor to the CEO had the same level of network access.)

If I recall correctly, without googling, it was a hvac contractors account that was left active with no expiration date they used to achieve all of this. Can I use you as a recommendation for my job with Target?

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Leviathan- said:

If I recall correctly, without googling, it was a hvac contractors account that was left active with no expiration date they used to achieve all of this. Can I use you as a recommendation for my job with Target?

It was a contractor, but from what I can see the contractor was still working with them (this is common in retail - they don't service their own HVAC normally), and that contractor's systems were compromised via a malicious link in an email. The contractor stored the credentials on their systems in plain text apparently, although the vector would've been an easy one to get via word of mouth from any 3rd party contractor or vendor. So, an unhappy former vendor rep could've given credentials out just as easily, or been social engineered into giving them out. Any credential would do. If Target's systems had been configured properly, such 3rd parties would not have been able to compromise the POS systems, at least without another flaw like a zero day or other unaddressed exploit to allow elevation of privileges.

 

And no, you couldn't use me for a recommendation, for several reasons, none so glamorous as having been involved with that hack, though.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×