Following the announcement of the May–July 2017 breach, Equifax's actions received widespread criticism. Equifax did not immediately disclose whether
PINs and other sensitive information were compromised, nor did it explain the delay between its discovery of the breach in July and its public announcement in early September. Equifax stated that the delay was due to the time needed to determine the scope of the intrusion and the large amount of personal data involved. It was also revealed that three Equifax executives sold almost $1.8 million of their personal holdings of company shares days after Equifax discovered the breach but more than a month before the breach was made public. The company said the executives, including the chief financial officer John Gamble, On September 18,
Bloomberg reported that the
U.S. Justice Department had opened an investigation to determine whether or not insider trading laws had been violated. "As Bloomberg notes, these transactions were not pre-scheduled trades and they took place on August 2, three days after the company learned of the hack". When publicly revealing the intrusion to its systems, Equifax offered a website (https://www.equifaxsecurity2017.com) for consumers to learn whether they were victims of the breach. Security experts quickly noted that the website had many traits in common with a
phishing website: it was not hosted on a domain registered to Equifax, it had a flawed TLS implementation, and it ran on
WordPress which is not generally considered suitable for high-security applications. These issues led
Open DNS to classify it as a phishing site and block access. Moreover, members of the public wanting to use the Equifax website to learn if their data had been compromised had to provide a last name and six digits of their social security number. As with https://www.equifaxsecurity2017.com, this website, too, was registered and constructed like a phishing website, and it was flagged as such by several web browsers. The Trusted ID Premier website contained
terms of use, dated September 6, 2017 (the day before Equifax announced the security breach) which included an
arbitration clause with a class action waiver. Attorneys said that the arbitration clause was ambiguous and that it could require consumers who accepted it to arbitrate claims related to the cybersecurity incident. The equifax.com website has separate terms of use with an arbitration clause and class action waiver, but, according to Brian Fung of
The Washington Post, "it's unclear if that applies to the credit monitoring program". New York Attorney General
Eric Schneiderman demanded that Equifax remove the arbitration clause. Joel Winston, a data protection lawyer, argued that the announcement disclaiming the arbitration clause "means nothing" because the terms of use state that they are the "entire agreement" between the parties. Responding to continuing public outrage, Equifax announced on September 12, 2017, that they "are waiving all Security Freeze fees for the next 30 days". Equifax has been criticized by security experts for registering a new domain name for the site name instead of using a subdomain of equifax.com. On September 20, 2017, it was reported that Equifax had been mistakenly linking to an unofficial "fake" web site instead of their own breach notification site in at least eight separate
tweets, unwittingly helping to direct a reported 200,000 hits to the imitation site. A software engineer named Nick Sweeting created the unauthorized Equifax web site to demonstrate how the official site could easily be confused with a
phishing site. Sweeting's site was upfront to visitors that it was not official, however, telling visitors who had entered sensitive information that "you just got bamboozled! this isnt a secure site! Tweet to @equifax to get them to change it to equifax.com before thousands of people loose their info to phishing sites!" Equifax apologized for the "confusion" and deleted the tweets linking to this site. ==See also==