From the course: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Real-world example #1: Equifax breach 2017

Real-world example #1: Equifax breach 2017

- [Narrator] Equifax is an American credit monitoring company. It uses sensitive financial and personal information to calculate credit scores, which are then used by individuals trying to obtain a loan. In the 2017 Equifax breach, nearly 150 million records were stolen. Compromised information included social security number, date of birth, address, and credit report information. Additionally, more than 200,000 credit card numbers were also breached in the attack. This type of information is pretty much exactly what a bad actor needs to commit identity theft. How did this happen? Unfortunately, Equifax was using vulnerable and outdated software components. And these were exploited by malicious hackers. The specific vulnerable software component involved in the breach is an open source component called Apache Struts. This particular vulnerability could be leveraged to perform RCE, or remote code execution. Remote…

Contents