DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Equifax service remains mum about client reports of tax refund fraud

Posted on June 20, 2016 by Dissent

Back in April, DataBreaches.net noted that Stanford University was notifying its employees about tax refund fraud.  The fraud appeared to result from perpetrators downloading employees’ W-2 information from the university’s vendor, W-2 Express, and then using the info to file fraudulent returns. W-2 information typically includes an employee’s name and address, their wage and salary information, as well as federal, state, and other taxes that were withheld.

To access the W-2 forms from W-2 Express, the perpetrators needed to know the employees’ Social Security numbers and date of birth – but not even their full Social Security number and full date of birth, it appears.

W-2 Express is a service of Equifax, and Stanford University was not the only organization to report that their employees’ W-2 forms had been improperly accessed at W-2 Express. Northwestern University issued a similar report, as did grocery giant Kroger. In Kroger’s case, the login credentials were the last four digits of the SSN and the 4-digit year of birth. Equifax would not respond to an inquiry from this site as to whether that was their standard setup, but a Kroger spokesperson told Brian Krebs that other companies that relied on Equifax for W-2 data also used last four digits of the SSN and 4-digit birth year as authenticators. Kroger notified its employees of the risk of tax refund fraud in May. By the end of the month, the first potential class action lawsuit against Equifax had been filed.

How many other clients received similar reports is not known at this time. Nor has it been confirmed by Equifax whether W-2 Express requires that employees of clients use SSN and DOB as login credentials or if that is a decision made by the clients.

As Stanford University’s investigation continued, it was still not clear how the perpetrators would have obtained the employees’ SSN and date of birth. By the end of April, Stanford estimated that at least 700 employees had been impacted. A copy of Stanford University’s notification letter to employees has been uploaded to the Vermont Attorney General’s site.

DataBreaches.net sent Equifax an inquiry with five questions about the incident and its scope. In response, Equifax sent a response that did not provide any new information and certainly did not answer any of the questions posed. So here are the questions that DataBreaches.net think still need answering:

1. Does the W-2 Express service require the use of SSN and DOB as login credentials, or does the client determine whether they want to use SSN/DOB or an alternative set of credentials? And if there are alternatives to using SSN/DOB, what types of alternatives are there for login credentials?

2. Was W-2 Express’s authorization controls configured to lock out IP addresses coming from overseas or out of the employees’ geographic area? If not, why not?

3. What changes has W-2 Express made in response to these incidents to strengthen/harden access controls?

4. How many clients of W-2 Express reported that their employees became victims of tax refund fraud?

5. Is there any evidence that in addition to obtaining W-2 statements, the criminals also obtained these individuals’credit reports by using the same credentials?

If anyone knows the answers to these questions, please let this site know. The encryption key is on the home page for this web site if you wish to use encrypted email.

And perhaps there should be one more question – for the Federal Trade Commission:

6. In this day and age, when so many people have already had their identity information compromised, how can it possibly be considered “reasonable security” to use the last four digits of SSN and 4-year DOB as login credentials for something as important as W-2 information?

Category: Breach IncidentsCommentaries and AnalysesEducation SectorID TheftSubcontractorU.S.

Post navigation

← IE: Civil Service payroll system to be audited following data breach
To the anonymous researchers who contacted me →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.