Hey Experian, what is happening? Time to check in with you from blog The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
Hey Experian, what is happening? Time to check in with you
Hello everyone, welcome to probably a very interesting article that I read yesterday. It probably has to go in to the worst things that I’ve read in the “I probably haven’t learned a thing” department.
All three major credit bureaus have had a breach of one magnitude or another. Fine. I’m game with that, because at some point, whether we know it, we’re all going to be breached individually or as part of a company.
Now, it seems as though Experian hasn’t really learned anything. According to Experian, You Have Some Explaining to Do which was read yesterday, you really need to do some explaining.
How can you potentially allow someone to sign up with an email address that is already assigned to an account? You also have some form of two-factor, yet you aren’t using it all the time like the major providers like Google, Name Ceap and others that have it? I know about the check box that says to trust the device, and that is all well and good, but you apparently only sent verification when you felt like it?
Twice in the past month KrebsOnSecurity has heard from readers who had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim’s personal information and a different email address.
This is the first paragraph of the linked article for today’s story. But it is only the beginning of the story.
Someone got an email saying that the account was changed, using their email address. When talking to Experian, which BTW took forever, he authenticated just fine, but the security questions were changed to something the gentleman wouldn’t have used, and resetting the account would be useless.
So Experian allows someone who already has an account to sign up with a stolen address and get info on said person with no verification of anything.
Brian Krebs says that he tried it on the other two major sites and they both had him go through the password recovery department if you will. This was what should proababluy be expected. To make matters worse, the guy who’s account was taken had a strong password, taken from a password manager like Lastpass, Trend Micro, Keypass, Apple Keychain or any other that might be out there that could make secure passwords. The fact that the account was done this way was perfect, because I don’t think I’d expect less with someone who was in this field or doing similar computer work like software development or the like.
“The most frustrating part of this whole thing is that I received multiple ‘here’s your login information’ emails later that I attributed to the original attackers coming back and attempting to use the ‘forgot email/username’ flow, likely using my SSN and DOB, but it didn’t go to their email that they were expecting,” Turner said. “Given that Experian doesn’t support two-factor authentication of any kind — and that I don’t know how they were able to get access to my account in the first place — I’ve felt very helpless ever since.”
That’s the question, right? How did the thief get access to Mr. Turner’s account by just signing up with an account with his email address he already used for said account?
Another gentleman had his account in trouble by an enquiry even though his credit file was apparently locked. Experian never answered the phone after hours of waiting. Who works at this company anyway?
After recreating his account, he saw that his account was unfrozen, something he never did. Really? Is something phishy going on with this company?
In a written statement, Experian suggested that what happened to Rishi and Turner was not a normal occurrence, and that its security and identity verification practices extend beyond what is visible to the user.
“We believe these are isolated incidents of fraud using stolen consumer information,” Experian’s statement reads. “Specific to your question, once an Experian account is created, if someone attempts to create a second Experian account, our systems will notify the original email on file.”
“We go beyond reliance on personally identifiable information (PII) or a consumer’s ability to answer knowledge-based authentication questions to access our systems,” the statement continues. “We do not disclose additional processes for obvious security reasons; however, our data and analytical capabilities verify identity elements across multiple data sources and are not visible to the consumer. This is designed to create a more positive experience for our consumers and to provide additional layers of protection. We take consumer privacy and security seriously, and we continually review our security processes to guard against constant and evolving threats posed by fraudsters.”
We’re supposed to believe this? We sometimes send a message to verify login or other activity and this was an unfortunate circumstance to two very different people, one who use a secure password while we’re not sure of the other? I call bull. I have no accounts at any credit bureau, probably a bad move, but this doesn’t quite sit well with me at all.
Brian Krebs goes in to detail on analysis which is discussed within the article.
Again, the article is titled Experian, You Have Some Explaining to Do and I urge people to read this one. This has got to be the worst thing a company can do or say. I don’t think its isolated, I think there is something phishy going on. You be the judge!
Informazioni sull'articolo
Hey Experian, what is happening? Time to check in with you was released on July 12, 2022 at 5:00 pm by tech in article commentary.
Last modified: July 12, 2022.
Comments (0)
No comments yet.
Leave a comment
You must be logged in to post a comment.
navigation menu
- Archives
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
Join 8 other subscribers
- The tech blog’s pages
- Blogroll
- Crashmasters blog
- Cyberscoop
- Documentation
- Improve Internet Accessibility for Individuals with Impaired Vision
- International friends network stream
- Kim Komando
- Krebs On Security
- Plugins
- Register to this site
- Suggest Ideas
- Support Forum
- supporters and partners
- the blind perspective
- The Jared Rimer Network donations page
- The Phishlabs Blog
- The Security Box discussion list
- The Technology blog and podcast and TSB on amazon music podcasts
- Themes
- toptechtidbits
- WordPress Blog
- WordPress Planet
- “Blind VMS and the Tech podcast join forces”