What historical event used a malware attachment to steal user information and passwords?1 pointMorris wormEquifax breachBrain virusLoveLetter attack
Question
What historical event used a malware attachment to steal user information and passwords?
1 point
- Morris worm
- Equifax breach
- Brain virus
- LoveLetter attack
Solution
The Equifax breach is the historical event that used a malware attachment to steal user information and passwords. Here are the steps that led to this event:
-
Vulnerability Discovery: The breach was made possible due to a vulnerability in the Apache Struts web-application software, a tool used for developing Java applications.
-
Exploitation: The hackers exploited this vulnerability to gain access to the Equifax systems. This happened because Equifax failed to install the necessary patches that were released to fix this vulnerability.
-
Data Access: Once inside the system, the hackers had access to the databases containing the personal information of millions of individuals.
-
Data Theft: The hackers then proceeded to steal the data. This included names, Social Security numbers, birth dates, addresses and, in some instances, driver's license numbers.
-
Detection and Response: The breach was detected by Equifax on July 29, 2017, and they took steps to stop the intrusion. However, by this time, the hackers had already had access to the system for over two months.
-
Public Disclosure: Equifax publicly disclosed the breach on September 7, 2017, revealing that the personal information of 143 million consumers had been compromised.
So, the Equifax breach is the historical event that used a malware attachment to steal user information and passwords.
Similar Questions
The history of cybersecurity dates back several decades. When did the first computer worm, Creeper, emerge?
What computer virus holds the record for being the most widespread computer virus?
Which of the following is not an example of malicious code?Group of answer choicessnifferbot networksTrojan horseransomware
Which of the following threats are examples of malware? Select two answers.1 pointWormsBugsError messagesViruses
Which of the following is not a common method for spreading malware? Email attachments Social engineering Phishing System updates
Upgrade your grade with Knowee
Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.