Skip to content

Equifax Data Breach: Hackers Used Sophisticated Techniques to Evade Detection

Equifax's stolen records were divided into smaller files, making detection harder. The hackers' use of data compression and encryption allowed them to transmit data over extended periods, undetected.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

Equifax Data Breach: Hackers Used Sophisticated Techniques to Evade Detection

Hackers behind the 2017 Equifax data breach employed sophisticated techniques to evade detection. They exploited data compression and file splitting technology, extending the theft over time and blending in with legitimate traffic.

The hackers divided Equifax's stolen records into smaller files, making it harder to detect the breach. This method, provided by companies like Arxan and Security Innovation, allowed the hackers to transmit the data over extended periods. Encrypting outbound traffic further obscured their activity, making it indistinguishable from routine traffic.

The size of the stolen records also played a role. A single photo, for instance, contains more data than a text file listing personal information. This meant the hackers needed more time to download all the data, which they achieved by spreading the theft over time. The full data theft could not have occurred within a single IT-security-officer's smoke break, highlighting the breach's complexity and duration.

The Equifax data breach demonstrated hackers' evolving techniques. By compressing data, splitting files, and extending the theft over time, they evaded detection for months. Companies must now balance robust security measures with user convenience to protect against such sophisticated attacks.

Read also:

Latest