Equifax Had 'Admin' as Login and Password in Argentina (bbc.com) 123
Reader wired_parrot writes: The credit report provider Equifax has been accused of a fresh data security breach, this time affecting its Argentine operations. The breach was revealed after security researchers discovered that an online employee tool used by Equifax Argentina was accessible using the "admin/admin" password combination.
MAGA (Score:3, Funny)
Make Admin Great Again
At this point, Equifux is circling the drain. Time for those insiders to cash out.
Re:MAGA (Score:5, Insightful)
Some of them conveniently sold their stock the day before the big announcement... but of course they had no idea about the breach.
Re: (Score:1)
How is this marked a troll? it's a perfect representation of the US
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Are you shitting me ? (Score:2)
What kind of moron working at a credit reporting agency fails to change the DEFAULT login and password. ? I hope that clown got fired
Re: (Score:1)
So your default passwords now are correcthorsebatterystaple?
https://xkcd.com/936/
Re: (Score:2)
Nah....I just usually use the same passcode as I do for my luggage.
Re: (Score:1)
I secure my luggage with a good key-ring, is more difficult to open than most of the small padlocks.
Re: (Score:2)
While true, it's at least generally VERY difficult to hide that you've ripped a zipper open...
Re: (Score:1)
No, Dinugs. If you can't move the clasp because it's been immobilized, remember? That's why you used a pen in the first place.
Re: (Score:2)
Re: Are you shitting me ? (Score:2)
Well, he is an idiot.
Re: (Score:1)
I agree. I mostly work at small companies with a few employees and sales in millions not billions. The first thing I do is put better password policies in place.
I once worked with a company that had taken on agile a bit too far. Everything (and I mean every single bit change) had to go through adding a user story to a backlog, then stay there until biweekly sprint planning where it would be estimated according to tshirt size and presented to the product owner which then decided if it should be added to the upcoming sprint, moved back or tossed completely. At one point I had a story about replacing default passwords shot down with the reasoning that it simply did no
Re:Are you shitting me ? (Score:5, Funny)
username: clown
password: fired
Added to my list of test logins/passwords.
Re: (Score:2)
username: outsourced_clown
password: fired
Added to my list of test logins/passwords.
FTFY
more than one moron (Score:2)
I don't think you can single out one person, it seems as if there would be plenty of people to blame for not changing it.
Re: (Score:2)
I don't think you can single out one person, it seems as if there would be plenty of people to blame for not changing it.
And you can reasonably punish all of them.
Re: (Score:2)
Indeed, if it is a systematic problem then there is even more reason to take action to correct it.
Re:more than one moron (Score:5, Insightful)
Why does equipment even have a default user/password?
It simply should not function until you have changed/set it.
Re: (Score:2)
Why does equipment even have a default user/password? It simply should not function until you have changed/set it.
That is actually true of a few modern devices. Unfortunately many of these device makers buy off-the-shelf firmware to plug in to their gadgets. Perhaps a regulation or two?
Re: (Score:3)
Personally, I'm a fan of having a default password be something intrinsic and unique to that specific device, such as
a wifi router with the default password being both fairly strong and printed on the bottom.
Re: (Score:2)
Yes that makes sense.
Fixed enough wifis, where no one really knew why did not work and what the password is. Luckily they never changed the "build in" password, printed on the bottom.
Re:Are you shitting me ? (Score:5, Informative)
Re: (Score:2)
Re: (Score:3, Insightful)
I refuse to believe in this timeline. This is a special abstract kind of hell. How much do you think the people that came up with this system were paid?
You are right to disbelieve. The world actually ended in 2012, just like the Mayan prophecy said. We have been living in a post apocalyptic nightmare inside the minds of the old ones ever since.
Re: (Score:2)
2012 is close, but no.
When email first hit small business,ca. 1995, I was working at a law firm.
At a meeting, management directed me to stop all unsolicited emails from entering the building.
I explained what spam was, and told them to sue for lack of productivity or something because, fuck it, they were a bunch of goddam lawyers .
We revisited that shit for the next 20 years, off and on.
--
The "end" started when litigation never happened.
Re:Are you shitting me ? (Score:4, Interesting)
I don't see how a "debug mode" or an accident can get passwords located in the code like that, no matter how horri-bad a dev is.
Oh I can see it, some horri-bad dev write a "Select * from users" because that is the only SQL he knows and then finds a bunch of extra fields in his response. And rather than asking someone or googling about selecting fields he then marks all the rest of the fields as hidden. Out of site, out of mind. Only master haxxor ninjas know how to right click a page and select view source.
Re: (Score:1)
Oh I can see it, some horri-bad dev write a "Select * from users...
If they had hashed, or even encrypted the passwords in the db, then at least they'd not be plain text in the source if they did a "SELECT *...". But no, this was likely shoddy at the very base levels, all the way up into the front end. I shudder to think about it. The full stack was garbage for this to happen.
Re: Are you shitting me ? (Score:2)
You have obviously never used any software that I wrote.
I have formally apologized.
Re:Are you shitting me ? (Score:5, Informative)
Argentinian here, I feel there's the need to clarify something: The DNI* thing is a red herring - in Argentina the number is like your name, using of using the DNI number as an enforced password is considered idiotic by normal people's standard
* Documento Nacional de Identidad, literally "national identity document" - it's used to refer to the document itself (it used to be a small book like a passport, nowadays it's an ID card) and the unique numeric identifier associated with the person itself
Re: Are you shitting me ? (Score:2)
It's idiotic and often illegal to use SSN that way in the US. Doesn't stop companies from doing it.
Re: (Score:2)
Re: (Score:1)
A friend of mine just brought up that we should just sell our own information now! LOL, we would be up $20 that way!
Its only valuable to the extent that it can be used to manipulate your life. Selling it yourself would make it worth far less than even $20.
Re: (Score:3)
What kind of moron working at a credit reporting agency fails to change the DEFAULT login and password. ? I hope that clown got fired
You must not get out much. The answer is "all kinds."
Re:Are you shitting me ? (Score:4, Interesting)
Shouldn't you be arrested for this level of breech. If you worked at a bank and it was robbed because the security guard always left a door unlocked that would be considered criminal.
Re: (Score:3)
Shouldn't you be arrested for this level of breech. If you worked at a bank and it was robbed because the security guard always left a door unlocked that would be considered criminal.
I'd at least cut their bonuses in half.
Re: (Score:2)
Physical security and electronic security are two different fronts. With physical security, if a security guard left a guard unlocked, there is physical evidence. With electronic security, all a company has to say is something along the lines of "hackers will win no matter what, so why bother?" and they will get off with, at best, a stern talking-to.
The past shows this to be true. Ever see a large company actually suffer because of a security breach? Definitely not, especially after they do the PR gambi
Re: (Score:2)
Re: (Score:2)
My question is... are the regulations enforced? Sarbanes-Oxley comes to mind of regulations that sounded good, but the only time it really got enforced on a public basis, was when someone went over their catch limit fishing.
I wouldn't mind seeing consistency with regs across nations, and some merging of standards (HIPAA, CJIS, FERPA, FISMA, FedRAMP, PCI-DSS 3.2.) Of course, some things can't overlap, but most of the stuff can. Have the certification be done by a fair third party, like a UL listing, but f
Re: (Score:2)
Having a username and password of admin/admin is the equivalent of leaving the door unlocked. Its in TFA.
Re: (Score:3)
tyler durden might have been right.
Re: (Score:2)
They shouldn't just fire the admin, but the admin's boss for not having proper security audit procedures in place.
If they actually had an auditor for that branch, maybe they should fire them as well for not doing a basic password audit on admin accounts.
Re:Are you shitting me ? (Score:4, Insightful)
Nonsense. We have the Cloud now, so it's totally cool to use default or easily guessable passwords.
Re: (Score:2)
Nope. It says in the contract with Tata India they can't fire. But hey, they saved money in the sound of mere thousands and helped raise the share price by outsourcing their IT
Re: (Score:2)
No.
Fire the motherfucker who hired that bastard (or bitch, as may apply).
Re: (Score:2)
Negligence does not get more gross (Score:4, Insightful)
This needs to be treated and punished the same as intent.
Re:Negligence does not get more gross (Score:5, Funny)
Kind of an Oprah moment: "You get a pink slip, and you get a pink slip, everybody gets a pink slip!"
Oops? (Score:2)
Jesus F*ing Christ! (Score:2)
Re: (Score:2)
But they won't. They'll get a $300 fine when adjusted to the average individual's income. Cost of doing business! Let's fuck over some more people!
Re: Jesus F*ing Christ! (Score:2)
And any fine they do get will get passed on to the public in order to preserve the executives bonuses.
Re: (Score:2)
Companies can't pass atypical costs onto the public. If the company could get more out of the public, it already would have. The costs get pushed back to the stockholders.
Re: (Score:1)
Amazing! (Score:3)
Re: (Score:2)
Sheer incompetence ... (Score:1)
If this is the kind of internal stuff they have, they have no fucking business holding other people's data.
This is about as incompetent as you can get. Like epic incompetence. You're fired kind of incompetence. You should never have another fucking job in the industry kind of incompetence.
It will be hard to shield themselves from liability with that level of stupid.
Re: (Score:2)
wow.. (Score:4, Insightful)
I mean we all know there is no such thing as 100% safe in information security but this is not even trying..
Second try (Score:3)
Second try, I guess Admin/password didn't work.
mah brane hertz (Score:2)
oooooowwwww
Anyone want to place bets..... (Score:3)
...... On the original hack being caused by something as stupid as this?
Re:Anyone want to place bets..... (Score:4, Interesting)
On the bright side Equifax's stock price is plummeting faster than a metric based Mars probe.
I hope they go bankrupt and every corporate board member spends the rest of their lives fighting identity theft. They deserve no less, since now I have to spend the rest of my fucking life fighting identity theft thanks to these assholes.
laughed out loud! (Score:2)
I just laughed out loud! Let me guess, all of their routers are admin G3t0ut.
Re: (Score:2)
Equifax Inc. has requested 96 H1B visa over the last 5 years all for $90k salary jobs (job market average there is ~$125k) for their Atlanta, GA offices.
In 2010 they outsourced their call centers overseas and 100 H1B's in the IT for a company of only 9500 employees means, yes, their entire IT department has been outsourced.
Holy crap (Score:2)
Steve Gibson will have a field day with this one... I wonder how many more eggredious displays of a total lack of security practices it'll take to entirely close the thing down.
I want to work at Equifax! (Score:3)
Really, I do want to work there!
I'll be a bloody genius there -- hell, even I know enough to change the login combo to "admin/equfax" -- and they'll pay me well for such brilliant security insights.
Oh, but wait.
Now that people -- and even chat-bots [theverge.com] -- are suing them blind over this mindless security breach, I'm thinking that maybe there won't be a company left when they're through.
Re: (Score:2)
I see what you did there! You purposely misspelled "equifax" for the password. Brillant!
Re: I want to work at Equifax! (Score:2)
If you can pretend to know what you are doing, you would make an excellent fall guy.
Ugly is skin deep... (Score:2)
Whiplash, from first to worst (Score:2)
At first I thought, man that is TOO secure, keeping the admin password only in Argentina.
Then I understood what the headline was trying to say...
Memory aid (Score:2)
How is there no Hitler reaction video to all (Score:3, Interesting)
this dumbfuckery? Get on it people!
Re: (Score:2)
Told you so... (Score:2)
*Ahem* I pretty much said as much previously. It's exciting to imagine a cabal of hackers doing things like this, however reality more often than not is just incompetence.
https://slashdot.org/comments.... [slashdot.org]
You can't fix stupid (Score:2)
Once again this proves that there is no technological solution to stupid human problems.
OTOH, a simple rule in the username/password database that prohibits admin/admin and other similar things like root/root could help. But then you'd just have people using their birthday or somesuch.
Don't cry for me, Argentina (Score:2)
The truth is, I never left you
All through my wild days, my mad existence
I kept my promise
Don't keep your distance
And as for fortune, and as for fame
I never invited them in