Personal Details Compromised in SEC Hack
US regulator discloses that social security numbers were compromised in Edgar cyber incident from 2016.
Need to know
- Personal information, including social security numbers, may have been exposed as a result of the 2016 breach, the SEC said on October 2.
- The agency’s chairman, Jay Clayton, has faced questioning by a Senate committee.
- The SEC has created a new cyber unit and dedicated resources to improving its capabilities in this area.
- However, it said, it is continuing to investigate the incident, which involved the SEC’s company filings system.
The US Securities and Exchange Commission (SEC) revealed on September 20, 2017, that its online system for company filings, the Electronic Data Gathering, Analysis and Retrieval System, or Edgar, had been compromised during 2016. The agency said that illicit trading may have taken place thanks to intruders accessing the confidential information contained there.
Things have only gotten worse from there. On October 2, the SEC provided an update, saying that it had determined that a test filing accessed by intruders had resulted in the loss of names, dates of birth and social security numbers of at least two people being accessed. The discovery came to light on September 29, the agency said, and it has been in touch with the individuals concerned.
“The 2016 intrusion and its ramifications concern me deeply,” said SEC chairman Jay Clayton, in a statement. “I am focused on getting to the bottom of the matter and, importantly, lifting our cybersecurity efforts moving forward.”
Clayton, who took over as chairman of the regulator in May 2017, was grilled by Senate lawmakers in a public session on September 26, who pressed him on the agency’s standards relating to cybersecurity at a time when the SEC is making rules for the industry around the same topics, and in light of a serious cybersecurity breach at credit ratings company Equifax weeks before.
Senators also pointed to the fact that the SEC is seeking to collect vast amounts of data on stock-market activity through the Consolidated Audit Trail (CAT) program, and expressed skepticism that it was properly equipped to handle that information.
“It is critical that the SEC safeguards the data it collects and maintains—especially as [the CAT] becomes operational,” said Mike Crapo, a Republican senator from Idaho, and the chairman of the banking committee. “The recent Equifax breach has highlighted the need to protect this sensitive and valuable information.”
Other senators were more direct in their criticisms, with Sherrod Brown, the ranking Democrat senator from Ohio, asking what else the public had not been told, in reference to the long gap between when the incident occurred and when it was disclosed.
“How can you expect companies to do the right thing when your agency has not?” he asked.
Vulnerabilities
The SEC has responded to outrage over the incident by announcing plans to expand its capabilities in cybersecurity. On September 25, the agency announced the creation of a new cyber unit, which would not only police hacking attempts but also the dissemination of false information in order to support market-manipulation schemes. Robert Cohen, the co-chief of the agency’s market abuse unit, will become the chief of the new division, the SEC said.
Such a scheme also occurred on Edgar in 2015, when fake information about a takeover of Avon Products was posted to the database, driving the stock price up before it was removed. Other such filing systems have also been subject to fraudulent postings, such as Companies House in the UK, where it was revealed that fraudsters had created fake companies using the names of US exchange groups, although no market manipulation was detected as a result.
However, the Edgar intrusion appears to be the most serious cyber-attack suffered by US regulators to date. It is doubly embarrassing for the agency after not only releasing a series of rules in 2014 to govern cybersecurity practices at financial firms, known as Regulation Systems Compliance and Integrity (Reg SCI), but also after state regulators such as the New York State Department of Financial Services have moved to implement increasingly stringent guidelines around best practice for cyber defenses.
“This incident clearly exposes how vulnerable our global financial ecosystem is, and how unprepared we are to fight skyrocketing cybercrime,” says Ilia Kolochenko, CEO of web-security firm High-Tech Bridge.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Regulation
Off-channel messaging (and regulators) still a massive headache for banks
Waters Wrap: Anthony wonders why US regulators are waging a war using fines, while European regulators have chosen a less draconian path.
Banks fret over vendor contracts as Dora deadline looms
Thousands of vendor contracts will need repapering to comply with EU’s new digital resilience rules
Chevron’s absence leaves questions for elusive AI regulation in US
The US Supreme Court’s decision to overturn the Chevron deference presents unique considerations for potential AI rules.
Aussie asset managers struggle to meet ‘bank-like’ collateral, margin obligations
New margin and collateral requirements imposed by UMR and its regulator, Apra, are forcing buy-side firms to find tools to help.
The costly sanctions risks hiding in your supply chain
In an age of geopolitical instability and rising fines, financial firms need to dig deep into the securities they invest in and the issuing company’s network of suppliers and associates.
Industry associations say ECB cloud guidelines clash with EU’s Dora
Responses from industry participants on the European Central Bank’s guidelines are expected in the coming weeks.
Regulators recommend Figi over Cusip, Isin for reporting in FDTA proposal
Another contentious battle in the world of identifiers pits the Figi against Cusip and the Isin, with regulators including the Fed, the SEC, and the CFTC so far backing the Figi.
US Supreme Court clips SEC’s wings with recent rulings
The Supreme Court made a host of decisions at the start of July that spell trouble for regulators—including the SEC.