Access Millions of academic & study documents

Screenshot 20211204 132744 drive

Content type
User Generated
School
University of Nairobi
Showing Page:
1/1

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
After installing the first web shells, the attackers accessed a mounted file share containing unencrypted application credentials (i.e., username and password) stored in a configuration file database [...]. Mounting is a process by which the operating system makes files and directories on a storage device available for internal access via the computer's file system. Attackers were able to access the file share because Equifax did not limit access to sensitive files across its internal legacy IT systems. Ayres stated storage of these credentials in this manner was inconsistent with Equifax policy. Although the ACIS application required access to only three databases within the Equifax environment to perform its business function, the ACIS application was not segmented off from other, unrelated databases. As a result, the attackers used the application credentials to gain access to 48 unrelated databases outside of the ACIS environment. Attackers ran approximately 9,000 queries on these databases and obtained access to sensitive stored data [...]. The attackers queried the metadata from a specific table to discover the type of information contained within the table. Once the attackers found a table with PII, they performed additional queries to retrieve the data from the table 184 In total 265 of the 9.000 queries the attackers ran within the Fauifay ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents