meta_pixel
Tapesearch Logo
Log in
Malicious Life

The Equifax Data Breach Pt. II: The Bits Hit The Fan

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 11 April 2019

⏱️ 31 minutes

🧾️ Download transcript

Summary

After its momentous breach, Equifax's CEO Richard Smith said: “Equifax will not be defined by this incident, but rather by how we respond.”
Well, he was spot on, but not in a good way. Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Welcome back to Malicious Life. My name is Ran Levy. If you were both particularly attuned to website domain registrations and a little bit psychic, you might have noticed something odd occur on September 5, 2017

0:29.1

when a purchase was made for Equihax.com. The man who bought Equihax was named Brendan Shondonfer.

0:37.6

He lived in the beautiful and historic city of Alexandria, Virginia,

0:42.1

and worked for the cyber security firm, Mandiant.

0:45.7

The reason you would have needed to be psychic to notice and why such a registration would have seemed

0:52.1

odd is that even by September 5th, almost four months

0:56.8

after attackers first broke into Equifax Incorporated internal computer systems and began stealing the personal information of millions upon millions of Americans,

1:08.0

you could have fit everybody who knew about any of it into one spacious conference room.

1:14.4

Richard Smith,

1:22.4

Equifax's CEO, was notified about the intrusion a month and a half earlier on July 13th, the day after it was detected.

1:32.0

Rather than notify the public, Smith claimed in later testimony to U.S. government officials

1:39.0

that he kept the news secret in order to prevent copycat attackers from hearing about and carrying out similar

1:46.5

attacks sooner than they could defend against them.

1:50.1

Justified or not, the excuse gave his team ample time to respond to their discovery,

1:55.8

without yet having to face public scrutiny.

1:58.9

This was what everyone had been preparing for even since 2005 when Tony Spinelli first

2:06.6

got hired on as CSO. Emergency response only a few weeks time to read the intruders, mitigate the damage, and restore

2:16.2

normality.

2:18.0

Richard Smith immediately formed two task teams, Project Sierra and Project Sparta.

2:24.5

Project Sierra, also reference to as the company's Crisis Action Team, was responsible for addressing

2:31.0

the hack, investigating the events, the causes, rewriting administrator

2:35.4

account credentials, cleaning up the network and everything in between.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.