The vulnerability that allowed hackers to exploit the system was called Apache Struts CVE-2017-5638. It allows the attackers to execute remote commands and injection of attacks. These are done through the parsing of malicious content (Berghel, 2017).
It allows the commands to be executed under the Web server privileges (Berghel, 2017). However, the organization could have prevented the hackers’ infiltration because it is known that the vulnerability was identified long before the attack. Prolonged delay of the system patching led the company to fail in the face of hackers’ attacks. The issue should have been resolved by utilizing firewalls for web applications such as mod_security with the inclusion of valid content into the whitelist. Moreover, struts could have been replaced by plugins with similar functionality. Therefore, the attack is a result of the company’s negligence in the maintenance of its programming services.
There are many preventive measures to ensure a stable future for the company and the impossibility of a similar event. First of all, internal applications need to be properly maintained and kept relevant through proper patching and updates.
This way majority of the problems could be resolved. Secondly, the company should maintain a strict policy concerning system security and its audit. Simultaneously, preparing necessary precautionary measures, in case a similar problem with the system is found, is mandatory. Thirdly, the company should keep track of common vulnerability exposures through verified sources to compare them with the existing system and then inspect and fix any problems from the list. The final suggestion is to keep a note of the software dependencies and segment complex applications into smaller parts for more effective damage control. Successful application of the listed recommendations is an effective way to stop future attacks.
Reference
Berghel, H. (2017). Equifax and the latest round of identity theft roulette. Computer, 50(12), 72-76.