Equifax Breach: Lasting Lessons

Analysis of the 2017 Equifax breach that exposed 147 million Americans' SSNs, how it happened, and lasting lessons for personal security.

Table of Contents

The 2017 Equifax breach remains a defining moment in data security history. When attackers exploited a known, unpatched vulnerability to steal the Social Security numbers, birth dates, and personal details of 147 million Americans, they compromised the financial identities of nearly half the US population. The breach was not sophisticated in its execution – it exploited a vulnerability with a known fix. Its severity stemmed from Equifax’s failure to implement basic security practices and the uniquely sensitive nature of the data a credit bureau holds. As part of our Data Breaches & Identity Protection guide, this article examines what happened, why it mattered, and what lasting lessons it holds for personal security nearly a decade later.

What Happened: Timeline

The Vulnerability: March 2017

On March 7, 2017, the Apache Software Foundation disclosed a critical vulnerability in Apache Struts (CVE-2017-5638), a widely used web application framework. The vulnerability allowed remote code execution – meaning an attacker could run arbitrary commands on any server running an unpatched version of Struts. A patch was released the same day.

The severity was immediately clear. The US-CERT (Computer Emergency Readiness Team) issued an alert. Security researchers published proof-of-concept exploit code within days. Scanning for vulnerable servers began almost immediately.

The Failure to Patch: March-May 2017

Equifax’s security team was notified of the vulnerability and the need to patch. However, the company failed to apply the patch to all affected systems. An internal scan intended to identify vulnerable servers did not flag the specific system that would later be breached – an internet-facing web portal for consumer dispute resolution.

For over two months, this critical system ran unpatched and exposed to the internet, despite the existence of a known, actively exploited vulnerability with a readily available fix.

The Breach: May-July 2017

On May 13, 2017, attackers exploited the unpatched Apache Struts vulnerability to gain access to Equifax’s system. Over the next 76 days, they moved laterally through the network, accessing database after database containing consumer information.

The attackers were able to operate undetected for two and a half months due to several compounding failures:

  • An expired SSL certificate on a security monitoring tool meant that encrypted traffic was not being inspected
  • Network segmentation was insufficient, allowing the attackers to reach databases far beyond the initially compromised system
  • Data access logging and alerting were inadequate to detect the massive volume of data being exfiltrated

Discovery and Disclosure: July-September 2017

On July 29, 2017, Equifax’s security team finally discovered the intrusion after renewing the expired SSL certificate and observing suspicious network traffic. The company launched an internal investigation and engaged Mandiant for forensic analysis.

Equifax did not publicly disclose the breach until September 7, 2017 – 40 days after discovery and nearly four months after the breach began. During this period, several Equifax executives sold company stock, leading to insider trading charges (three executives were later charged by the SEC).

What Was Exposed

The breach compromised data for approximately 147 million Americans:

  • Social Security numbers – the most critical exposure, as SSNs are the foundation of financial identity in the United States
  • Dates of birth – combined with SSNs, this enables comprehensive identity theft
  • Home addresses and address histories
  • Driver’s license numbers for approximately 10 million people
  • Credit card numbers for approximately 209,000 consumers
  • Dispute documents containing scanned images of personal documents (driver’s licenses, utility bills, Social Security cards) that consumers had submitted as part of credit disputes

The breach also affected approximately 15 million UK residents and 19,000 Canadian citizens.

How It Happened: A Cascade of Failures

The Equifax breach was not the result of a single mistake. It was a cascade of failures at every level of the organization’s security apparatus.

Failure 1: Patch Management

The most fundamental failure was the inability to patch a critical vulnerability in a timely manner. The vulnerability had a CVE severity score of 10.0 (the maximum). A patch was available from day one. Equifax had internal processes for patching but failed to execute them effectively. The specific system that was breached was missed by internal vulnerability scans.

Failure 2: Expired Security Certificate

An SSL inspection certificate used by Equifax’s intrusion detection system had expired ten months before the breach. This meant that the tool responsible for monitoring encrypted network traffic was effectively blind. The attackers’ data exfiltration went undetected because the traffic was encrypted and the monitoring tool could not inspect it.

Failure 3: Poor Network Segmentation

Once inside the initial system, the attackers were able to access 48 additional databases containing consumer information. Proper network segmentation would have limited the blast radius of the initial compromise. Instead, the flat network architecture allowed the attackers to traverse freely across sensitive systems.

Failure 4: Inadequate Monitoring

Even with the SSL certificate expired, robust monitoring of data access patterns should have detected the anomalous volume of database queries and data transfers. The fact that 147 million records were exfiltrated over 76 days without triggering alerts indicates fundamental gaps in Equifax’s security monitoring capabilities.

Impact

The $700 Million Settlement

In July 2019, Equifax agreed to a settlement with the Federal Trade Commission, the Consumer Financial Protection Bureau (CFPB), and 50 US states and territories:

  • Up to $425 million for consumer restitution, including credit monitoring, cash payments, and identity theft recovery services
  • $175 million to states and territories
  • $100 million to the CFPB as a civil penalty

Individual consumers could claim up to $125 in cash (later adjusted to much lower amounts due to the volume of claims) or free credit monitoring through Experian for up to ten years.

Regulatory and Industry Changes

The Equifax breach catalyzed significant regulatory action:

  • Congress held multiple hearings examining credit bureau security practices
  • The Equifax CEO, CIO, and CSO all resigned or were fired
  • New legislation was introduced (and in some states passed) requiring credit bureaus to implement specific security measures
  • The incident accelerated the conversation about consumer rights over personal financial data
  • Free credit freezes became law under the Economic Growth, Regulatory Relief, and Consumer Protection Act of 2018

Lasting Impact on Affected Individuals

Nearly a decade after the breach, affected individuals continue to deal with consequences:

  • Credit monitoring services provided through the settlement will eventually expire
  • The stolen SSNs remain in circulation in criminal markets
  • Identity theft attempts using Equifax-sourced data continue to surface
  • Many consumers discovered through the breach response process that they had little understanding of what credit bureaus collected about them

What Equifax Did in Response

Beyond the settlement, Equifax took several steps:

  • Replaced executive leadership, including the CEO, CIO, and CSO
  • Invested over $1.5 billion in security and technology transformation
  • Moved to cloud-based infrastructure with enhanced security controls
  • Implemented enhanced patch management and vulnerability scanning procedures
  • Offered free credit monitoring and credit lock services to all Americans (not just breach victims)

Lessons for Users

Lesson 1: You Cannot Opt Out of Credit Bureau Data Collection

Unlike most companies that experience breaches, you do not choose to be an Equifax customer. Credit bureaus collect your data whether you want them to or not, based on your participation in the credit system. This means you cannot mitigate risk by avoiding the company. Your only options are defensive measures after the fact.

Lesson 2: Credit Freezes Are Your Best Defense

A credit freeze prevents anyone – including criminals with your stolen SSN – from opening new credit accounts in your name. Following the Equifax breach, credit freezes became free by law. If you have not frozen your credit at all three bureaus, you are leaving yourself vulnerable to identity theft using data that has been circulating for nearly a decade.

Lesson 3: Patch Your Own Systems Too

The Equifax breach was caused by a failure to patch. While you cannot control Equifax’s patching practices, you can control your own. Keep your operating systems, browsers, and applications updated. Enable automatic updates where possible. Unpatched software is the most common entry point for attacks on individuals and organizations alike.

Lesson 4: Breached Data Is Forever

The 147 million SSNs stolen in 2017 are still available in criminal markets in 2026. They will remain available indefinitely. There is no expiration date on stolen data. This is why ongoing protective measures – credit freezes, monitoring, and vigilance – are not temporary responses but permanent lifestyle adjustments.

Lesson 5: Diversify Your Defenses

No single security measure is sufficient. Use a combination of:

  • Credit freezes at all three bureaus
  • Unique, strong passwords for every account via a password manager
  • Multi-factor authentication everywhere possible
  • Regular monitoring for breach exposure
  • Dark web monitoring services
  • IRS Identity Protection PIN (to prevent tax fraud)

How to Protect Yourself

Whether or not you were specifically notified as part of the Equifax breach, the scale of the incident (147 million out of approximately 330 million Americans) means you should assume your data was compromised. Take these steps:

  1. Freeze your credit at Equifax, Experian, and TransUnion. Also freeze at the lesser-known bureaus: Innovis, NCTUE, and ChexSystems. This is free and takes about 30 minutes total.

  2. Request your free annual credit report from AnnualCreditReport.com and review it for accounts you did not open. Do this for all three bureaus.

  3. Set up an IRS Identity Protection PIN to prevent fraudulent tax filings in your name. This is available to all US taxpayers and is renewed annually.

  4. Use a password manager to maintain unique, strong passwords for every financial account. PanicVault stores your password vault locally on your Apple devices using the KeePass format, ensuring that your credentials are not centralized on a vendor’s servers where they could be exposed in a future breach. This local-first approach directly addresses the risks demonstrated by centralized data storage failures like Equifax’s.

  5. Enable multi-factor authentication on all financial accounts, email accounts, and any service that supports it.

  6. Monitor your breach exposure through services that track stolen data appearing in criminal markets.

  7. File your taxes early each year to prevent criminals from filing fraudulent returns using your stolen SSN.

  8. Set up transaction alerts on all bank accounts and credit cards so you are immediately notified of unauthorized activity.

The Equifax breach taught a generation of Americans that their most sensitive financial data could be stolen through no fault of their own, from a company they never chose to do business with, due to a security failure as basic as not installing a software update. The lesson endures: take personal responsibility for your financial security, because the institutions holding your data may not.

Protect Your Passwords with PanicVault

A secure, offline-first password manager using the open KeePass format. Your passwords, your file, your control.

Download on the App Store