The former chief executive of Equifax Inc. plans to apologize for the credit reporting company’s massive data breach when he testifies Tuesday before a congressional committee, as well as detail the missteps in response to the hack that could have exposed the Social Security numbers and birthdates of as many as 145.5 million people.
“Equifax was entrusted with Americans’ private data and we let them down,” Richard Smith said in written testimony for the hearing that the House Energy and Commerce Committee released Monday. “To each and every person affected by this breach, I am deeply sorry that this occurred.”
Smith stepped down last week in the wake of the breach, which has sparked numerous federal and state investigations as well as outrage from lawmakers. His appearance Tuesday before the House panel will be the first of three before congressional committees this week.
In his written testimony, Smith blamed the breach on “human error and technology failures” and said the company was a victim of “a massive theft.”
“The company failed to prevent sensitive information from falling into the hands of wrongdoers,” he said.
“The people affected by this are not numbers in a database. They are my friends, my family, members of my church, the members of my community, my neighbors,” Smith said. “This breach has impacted all of them. It has impacted all of us.”
Smith also said Equifax was “disappointed” with the rollout of a special website and call centers to deal with the fallout from the breach. The company “struggled with the initial effort” to help consumers, he said.
Equifax has been criticized for waiting nearly six weeks to notify the public after learning of the hack July 29, and then initially making consumers give up their right to sue if they wanted free credit monitoring and identity theft protection. Equifax later backtracked on that requirement.
On Aug. 1, three Equifax executives sold thousands of shares of stock. All the shares sold for about $146 each. The company’s stock sharply declined after the data breach was announced. It was about $108 on Monday morning.
Equifax’s board of directors has formed a special committee and is “conducting a thorough review of the trading at issue,” Theodore M. Hester, an attorney retained by Equifax, said in a letter Friday to Democrats on the House Energy and Commerce Committee.
“Equifax takes these matters seriously,” Hester wrote.
The stock sales were among several questions about the data breach that the lawmakers had asked Smith about in a Sept. 12 letter.
Smith said the data breach problems started March 8 when the Department of Homeland Security’s Computer Emergency Readiness Team sent a notice to Equifax and other companies about the need to patch a vulnerability in software known as Apache Struts.
Equifax sent emails about the federal warning to workers responsible for the software, which is used in the company’s consumer online disputes portal. But the “vulnerable versions” of the software were not identified or patched, Smith said.
“Equifax’s efforts undertaken in March 2017 did not identify any versions of Apache Struts that were subject to this vulnerability, and the vulnerability remained in an Equifax web application much longer than it should have,” Smith said. The company is investigating why.
Hackers appear to have first used the software vulnerability to access sensitive information May 13 and continued to do so for weeks before Equifax’s security team identified suspicious network traffic July 29.
The next day, Equifax took the web portal offline.
Smith said he learned about the problem July 31 from the company’s chief information officer. A full response began Aug. 2, including contacting the FBI, Smith said.
Equifax and an independent cybersecurity forensic consulting firm, Mandiant, worked “literally around the clock” to figure out what happened, Smith said. But despite numerous internal discussions, Equifax did not publicly announce the breach until Sept. 7.
Smith said one reason for the delay was that experts had told company executives that notifying the public “would provoke ‘copycat attempts’ and other criminal activity.”
Equifax is trying to help consumers while also fixing its security systems, he said. The company’s “vulnerability scanning and patch management processes and procedures” have been enhanced, Smith said.
Smith noted that in addition to his departure, the company’s chief information officer and chief security officer also left the company after the breach.
Subscribe to the Morning Review newsletter
Get the day’s top headlines delivered to your inbox every morning by subscribing to our newsletter