{"id":27288,"date":"2019-06-14T16:08:03","date_gmt":"2019-06-14T16:08:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30236\/4-US-Agencies-Dont-Properly-Verify-Your-Data-Due-To-The-Equifax-Breach.html"},"modified":"2019-06-14T16:08:03","modified_gmt":"2019-06-14T16:08:03","slug":"4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/","title":{"rendered":"4 US Agencies Don&#8217;t Properly Verify Your Data Due To The Equifax Breach"},"content":{"rendered":"<p><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/dYUhREdKdtWabUGgrOrHZOPoslE=\/1092x0\/2019\/06\/13\/e5478e7c-cde0-45f7-9689-356569896d17\/gettyimages-1083996410.jpg\" class alt=\"Equifax Consumer reporting agency company logo seen\" height=\"0\" width=\"1092\"><\/span><\/span><\/p>\n<p><span class=\"caption\">Equifax&#8217;s data breach gives away answers to security questions that agencies like Veterans Affairs and the Social Security Administration ask for verification purposes.<\/span><\/p>\n<p><span class=\"credit\">Igor Golovniov\/SOPA Images\/LightRocket via Getty Images<\/span><\/p>\n<p class=\"speakableTextP1\">Multiple government agencies are relying on a security measure that can be easily bypassed thanks to <a href=\"https:\/\/www.cnet.com\/news\/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed\/\">massive breaches like the Equifax hack<\/a>, the US Government Accountability Office has found. In a report released Friday, the <a href=\"https:\/\/www.gao.gov\/products\/GAO-19-288\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener noreferrer\">government watchdog group found<\/a> that the US Postal Service, the Department of Veterans Affairs, the Social Security Administration and the Centers for Medicare and Medicaid Services have still been using &#8220;Knowledge-Based Verification&#8221; to make sure people who apply for benefits online are authentic.<\/p>\n<p class=\"speakableTextP2\">This verification method asked applicants questions like their date of birth, Social Security numbers and addresses, assuming that only the applicant would have that information. But in <a href=\"https:\/\/www.cnet.com\/tags\/equifax\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Equifax|CNET_TAG|446&quot;}\">Equifax&#8217;s<\/a> breach in 2017, that <a href=\"https:\/\/www.cnet.com\/news\/equifaxs-data-breach-by-the-numbers-the-full-breakdown\/\">information had been stolen from 145.5 million Americans<\/a>, rounding out to more than half the US population.<\/p>\n<p>That exposed many federal agencies using Knowledge-Based Verification to widespread fraud, as potential attackers could use the stolen information to apply for benefits and get replacement Social Security cards, the GAO found.&nbsp;<\/p>\n<p>In 2017, the <a href=\"https:\/\/pages.nist.gov\/800-63-FAQ\/#q-b7\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener noreferrer\">National Institute of Standards and Technology<\/a> started advising against that verification method.<\/p>\n<p>Lawmakers asked the government watchdog to review how many federal agencies were still using the outdated verification method after the Equifax breach. While the IRS and the General Services Administration dropped Knowledge-Based Verification as a security measure, the GAO found four federal agencies that were still relying on it.<\/p>\n<p>In letters to all four agencies, Sen. Elizabeth Warren (D-Mass.), Sen. Ron Wyden (D-Ore.) and Rep. Elijah Cummings (D-Md.) asking what steps they were taking to protect consumer privacy after Equifax&#8217;s breach, and why they were still using an outdated verification system.<\/p>\n<p>&#8220;It is troubling that almost two years after the massive 2017 Equifax data breach federal government agencies continue to use outdated identity-proofing methods that put citizens at increased risk of identity theft,&#8221; the lawmakers said in a statement. &#8220;We need to do more to prevent these kinds of breaches, and the government needs to be better and smarter about protecting citizens.&#8221;<\/p>\n<p>A Veterans Affairs spokesman said the agency &#8220;appreciates the lawmakers&#8217; views and will respond to them directly.&#8221; The Social Security Administration said it received the letter and will also respond to members of Congress. The other two agencies identified in the report didn&#8217;t immediately respond to requests for comment.<\/p>\n<p>The GAO&#8217;s report found that there were several alternatives to Knowledge-Based Verification, like authentication in-person, or using mobile devices to check in. The USPS and SSA told the GAO they were looking into alternatives but didn&#8217;t expect to implement it by the end of this year. The SSA is looking to implement a safer method by 2020.<\/p>\n<p>CMS said it had no plans to remove the verification method, telling the GAO that its users prefer the insecure measure, despite the potential for fraud, according to the report.<\/p>\n<p>VA implemented alternatives but only as a supplement to the outdated security measure, the report said.<\/p>\n<p>Officials from those three organizations said that while NIST stopped recommending Knowledge-Based Verification, it did not provide any viable alternatives. The GAO recommended that NIST improve its recommendations for federal agencies, for government organizations to improve on its verification methods and for the Office of Management and Budget to require agencies to report on their progress.<\/p>\n<p>&#8220;Nevertheless, until these agencies take steps to eliminate their use of knowledge-based verification, the individuals they serve will remain at increased risk of identity fraud,&#8221; the GAO said in its report.&nbsp;<\/p>\n<p>Originally published June 14, 6 a.m. PT.<strong><br \/>Update, 8:18 a.m. PT:<\/strong>&nbsp;Adds response from the Department of Veterans Affairs;<strong>&nbsp;8:38 a.m.<\/strong> <strong>PT<\/strong>: Adds response from the Social Security Administration.<\/p>\n<footer class=\"row\"> <\/footer>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30236\/4-US-Agencies-Dont-Properly-Verify-Your-Data-Due-To-The-Equifax-Breach.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27289,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6750],"class_list":["post-27288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyusadata-lossfraudidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 US Agencies Don&#039;t Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 US Agencies Don&#039;t Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-14T16:08:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1092\" \/>\n\t<meta property=\"og:image:height\" content=\"819\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"4 US Agencies Don&#8217;t Properly Verify Your Data Due To The Equifax Breach\",\"datePublished\":\"2019-06-14T16:08:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/\"},\"wordCount\":645,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg\",\"keywords\":[\"headline,government,privacy,usa,data loss,fraud,identity theft\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/\",\"name\":\"4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg\",\"datePublished\":\"2019-06-14T16:08:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg\",\"width\":1092,\"height\":819},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,usa,data loss,fraud,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyusadata-lossfraudidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"4 US Agencies Don&#8217;t Properly Verify Your Data Due To The Equifax Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/","og_locale":"en_US","og_type":"article","og_title":"4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-14T16:08:03+00:00","og_image":[{"width":1092,"height":819,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"4 US Agencies Don&#8217;t Properly Verify Your Data Due To The Equifax Breach","datePublished":"2019-06-14T16:08:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/"},"wordCount":645,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg","keywords":["headline,government,privacy,usa,data loss,fraud,identity theft"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/","url":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/","name":"4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg","datePublished":"2019-06-14T16:08:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach.jpg","width":1092,"height":819},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/4-us-agencies-dont-properly-verify-your-data-due-to-the-equifax-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,usa,data loss,fraud,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyusadata-lossfraudidentity-theft\/"},{"@type":"ListItem","position":3,"name":"4 US Agencies Don&#8217;t Properly Verify Your Data Due To The Equifax Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27288"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27289"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}