The SEC Hack and Its Repercussions
In their Corporate and Securities Litigation, Mark D. Harris and Margaret A. Dale write: Some have expressed concerns that the SEC is not fully equipped to handle the host of cybersecurity issues that will continue to come its way. Nonetheless, the SEC appears focused on the mission of increasing cybersecurity and determined to address the growing threat to markets.
October 13, 2017 at 02:00 PM
17 minute read
News about cyberattacks and data breaches that compromise personal and private information has begun to feel like a daily occurrence. The trend has affected not only the private sector; increasingly, government is also a target. Recently, the Securities and Exchange Commission disclosed that its EDGAR database, which functions as its online repository for periodic reports and registration statements filed by public companies and mutual funds, had been breached last year, and that it only recently discovered that non-public information, including corporate information and personal data, had been accessed. The disclosure of the cyberattack on the SEC coincides with the cybersecurity initiatives and directives that SEC Chairman Jay Clayton has made a priority, including the creation of a new Cyber Unit within the SEC's Enforcement Division. As the SEC presses on with its various initiatives, some have expressed concerns that the SEC is not fully equipped to handle the host of cybersecurity issues that will continue to come its way. Nonetheless, the SEC appears focused on the mission of increasing cybersecurity and determined to address the growing threat to markets.
|EDGAR Breach and SEC's New Efforts
On Sept. 20, 2017, the SEC published a statement by Chairman Clayton containing an overview of the SEC's approach to cybersecurity, after having initiated an assessment of the SEC's internal cybersecurity risk profile and approach to cybersecurity from a regulatory and oversight perspective in May 2017. Chairman Clayton noted that in today's environment, cyberattacks are perpetrated by a host of bad actors, including “identity thieves, unscrupulous contractors and vendors, malicious employees, business competitors, prospective insider trades and market manipulators, so-called 'hacktivists,' terrorists, [and] state-sponsored actors” that “create significant risks to the operational performance of market participants and of markets as a whole.” Statement on Cybersecurity, Chairman Jay Clayton (Sept. 20, 2017). He also recognized that “even the most diligent cybersecurity efforts will not address all cyber risks that enterprises risk.”
The most important revelation in the statement—that the SEC itself had been hacked—was buried midway through the report. Scant details of the intrusion were provided; instead, the statement merely reported that the SEC learned that the test filing component of EDGAR had been compromised and may have resulted in access by the hackers to non-public information:
In August 2017, the Commission learned that an incident previously detected in 2016 may have provided the basis for illicit gain through trading. Specifically, a software vulnerability in the test filing component of our EDGAR system, which was patched promptly after discovery, was exploited and resulted in access to non-public information. We believe the intrusion did not result in unauthorized access to personally identifiable information, jeopardize the operations of the Commission, or result in systemic risk. Our investigation of this matter is ongoing, however, and we are coordinating with appropriate authorities.
Id.
Public companies typically perform a test filing of their quarterly earnings on EDGAR the night before they plan to release that information. Since the hackers had access to that component of EDGAR, they were able to see earnings information the night before it was made public and potentially trade on it. This is just one example of the type of material, non-public information the hackers had access to.
Chairman Clayton was scheduled to testify on Sept. 25, 2017, before the Senate Committee on Banking, Housing, and Urban Development, his first such appearance since being confirmed. In written testimony, he provided a few additional details about the EDGAR hack:
We believe the 2016 intrusion involved the exploitation of a defect in custom software in the EDGAR system. When it was originally discovered, the SEC Office of Information Technology (OIT) staff took steps to remediate the defect in custom software code and reported the incident to the Department of Homeland Security's United Computer Emergency Readiness Team (US-CERT). Based on the investigation to date, OIT staff believes that the prior remediation effort was successful.
Testimony on “Oversight of the U.S. Securities and Exchange Commission” by Jay Clayton, Chairman, U.S. Securities and Exchange Commission, before the Committee on Banking, Housing and Urban Development, United States Senate, Sept. 26, 2017.
At the time, Chairman Clayton reiterated that the SEC did not believe that the intrusion resulted in unauthorized access to confidential personal or corporate information, but he emphasized that an investigation into the extent and impact of the “intrusion and related illicit activity” was ongoing. Just a few weeks later, additional details came to light. It appears that as a result of the breach, the names, dates of birth, and Social Security numbers of two individuals had been accessed by third parties. The individuals were being notified by the SEC that their personal information had been compromised. Chairman Clayton said, “The 2016 intrusion and its ramifications concern me deeply. I am focused on getting to the bottom of the matter, and, importantly, lifting our cybersecurity efforts moving forward.”
Around the same time, on Sept. 25, 2017, the SEC also announced the creation of a Cyber Unit within the Enforcement Division, as one of two new initiatives to build on the Enforcement Division's “ongoing efforts to address cyber-based threats and to protect retail investors.” SEC Announces Enforcement Initiatives to Combat Cyber-Based Threats and Protect Retail Investors (Sept. 25, 2017). The Cyber Unit will focus on targeting cyber-related misconduct such as market manipulation schemes involving false information spread through electronic social means; hacking to obtain material non-public information or access to retail brokerage accounts; violations involving distributed ledger (i.e., blockchain) technology and initial coin offerings; and cyber threats to trading platforms and other critical market infrastructure. The announcement noted that the Cyber Unit “complements the Chairman's initiatives to implement an internal cybersecurity risk profile and create a cybersecurity working group to coordinate information sharing, risk monitoring, and incident response efforts throughout the agency.” Stephanie Avakian, co-director of the SEC's Enforcement Division, added: “The Cyber Unit will enhance our ability to detect and investigate cyber threats through increasing expertise in an area of critical national importance.” Id.
|Concerns Following Breach
As the gatekeeper of troves of non-public market data, and the protector of market integrity, the SEC has faced criticisms and concerns from many sides stemming from the revelation of the hack.
One of the most basic concerns is that the SEC itself does not appear to follow the same (or similar) cyber- and data-security measures that it demands from the entities and investors that it regulates. For instance, under guidance issued in 2011 by the SEC's Division of Corporation Finance, companies may be obligated to timely disclose material information regarding cyber incidents as well as cyber risks. The SEC's delay in disclosing the 2016 hack as well as the initial lack of details it provided mirror the dilemmas many companies face about the disclosure of the “who, what, when, and how” of cyberattacks. Most troubling of all, Chairman Clayton suggested that the Commissioners and senior-level SEC staff were not informed about the 2016 hack until it was discovered by his recent review. Amidst all this news, one lawmaker went so far as to urge the SEC to delay its planned November 2017 launch of the Consolidated Audit Trail, which would track and collect all trading activity in equities and options across all U.S. markets, citing the recent disclosure of the EDGAR hack and the SEC's cybersecurity risks. Hearing entitled “Examining the SEC's Agenda, Operations, and Budget” before Members of the Committee on Financial Services, United States House of Representatives, Oct. 4, 2017. Similarly, the Investment Company Institute, a global investor group, called for an independent investigation into the EDGAR hack and urged the SEC to delay new data-gathering rules set to take effect at the end of the year that require funds to file monthly statements with their portfolio holdings confidentially with the SEC. Since the EDGAR hack was made public, reports have emerged that the U.S. Government Accountability Office (GAO) criticized and warned the SEC in July 2017 that it had not fully implemented an intrusion-detection capability and other security measures that the GAO previously recommended. Michelle Price, “Investor group seeks probe into SEC hack, urges data rules delay,” Reuters, Sept. 22, 2017. And it is still not known whether illegal trading on the basis of hacked information actually occurred.
Notwithstanding these concerns, it is clear that the SEC is focusing on cybersecurity at all levels of its operations, making cybersecurity readiness a key element of the examinations it conducts, and studying cyber-based threats against itself and the entities and persons it regulates. Given the stakes to the public and to our securities markets, this should certainly be among the agency's highest priorities.
Margaret A. Dale and Mark D. Harris are partners at Proskauer Rose. Massiel Pedreira, an associate, assisted in the preparation of this article.
News about cyberattacks and data breaches that compromise personal and private information has begun to feel like a daily occurrence. The trend has affected not only the private sector; increasingly, government is also a target. Recently, the Securities and Exchange Commission disclosed that its EDGAR database, which functions as its online repository for periodic reports and registration statements filed by public companies and mutual funds, had been breached last year, and that it only recently discovered that non-public information, including corporate information and personal data, had been accessed. The disclosure of the cyberattack on the SEC coincides with the cybersecurity initiatives and directives that SEC Chairman Jay Clayton has made a priority, including the creation of a new Cyber Unit within the SEC's Enforcement Division. As the SEC presses on with its various initiatives, some have expressed concerns that the SEC is not fully equipped to handle the host of cybersecurity issues that will continue to come its way. Nonetheless, the SEC appears focused on the mission of increasing cybersecurity and determined to address the growing threat to markets.
|EDGAR Breach and SEC's New Efforts
On Sept. 20, 2017, the SEC published a statement by Chairman Clayton containing an overview of the SEC's approach to cybersecurity, after having initiated an assessment of the SEC's internal cybersecurity risk profile and approach to cybersecurity from a regulatory and oversight perspective in May 2017. Chairman Clayton noted that in today's environment, cyberattacks are perpetrated by a host of bad actors, including “identity thieves, unscrupulous contractors and vendors, malicious employees, business competitors, prospective insider trades and market manipulators, so-called 'hacktivists,' terrorists, [and] state-sponsored actors” that “create significant risks to the operational performance of market participants and of markets as a whole.” Statement on Cybersecurity, Chairman Jay Clayton (Sept. 20, 2017). He also recognized that “even the most diligent cybersecurity efforts will not address all cyber risks that enterprises risk.”
The most important revelation in the statement—that the SEC itself had been hacked—was buried midway through the report. Scant details of the intrusion were provided; instead, the statement merely reported that the SEC learned that the test filing component of EDGAR had been compromised and may have resulted in access by the hackers to non-public information:
In August 2017, the Commission learned that an incident previously detected in 2016 may have provided the basis for illicit gain through trading. Specifically, a software vulnerability in the test filing component of our EDGAR system, which was patched promptly after discovery, was exploited and resulted in access to non-public information. We believe the intrusion did not result in unauthorized access to personally identifiable information, jeopardize the operations of the Commission, or result in systemic risk. Our investigation of this matter is ongoing, however, and we are coordinating with appropriate authorities.
Id.
Public companies typically perform a test filing of their quarterly earnings on EDGAR the night before they plan to release that information. Since the hackers had access to that component of EDGAR, they were able to see earnings information the night before it was made public and potentially trade on it. This is just one example of the type of material, non-public information the hackers had access to.
Chairman Clayton was scheduled to testify on Sept. 25, 2017, before the Senate Committee on Banking, Housing, and Urban Development, his first such appearance since being confirmed. In written testimony, he provided a few additional details about the EDGAR hack:
We believe the 2016 intrusion involved the exploitation of a defect in custom software in the EDGAR system. When it was originally discovered, the SEC Office of Information Technology (OIT) staff took steps to remediate the defect in custom software code and reported the incident to the Department of Homeland Security's United Computer Emergency Readiness Team (US-CERT). Based on the investigation to date, OIT staff believes that the prior remediation effort was successful.
Testimony on “Oversight of the U.S. Securities and Exchange Commission” by Jay Clayton, Chairman, U.S. Securities and Exchange Commission, before the Committee on Banking, Housing and Urban Development, United States Senate, Sept. 26, 2017.
At the time, Chairman Clayton reiterated that the SEC did not believe that the intrusion resulted in unauthorized access to confidential personal or corporate information, but he emphasized that an investigation into the extent and impact of the “intrusion and related illicit activity” was ongoing. Just a few weeks later, additional details came to light. It appears that as a result of the breach, the names, dates of birth, and Social Security numbers of two individuals had been accessed by third parties. The individuals were being notified by the SEC that their personal information had been compromised. Chairman Clayton said, “The 2016 intrusion and its ramifications concern me deeply. I am focused on getting to the bottom of the matter, and, importantly, lifting our cybersecurity efforts moving forward.”
Around the same time, on Sept. 25, 2017, the SEC also announced the creation of a Cyber Unit within the Enforcement Division, as one of two new initiatives to build on the Enforcement Division's “ongoing efforts to address cyber-based threats and to protect retail investors.” SEC Announces Enforcement Initiatives to Combat Cyber-Based Threats and Protect Retail Investors (Sept. 25, 2017). The Cyber Unit will focus on targeting cyber-related misconduct such as market manipulation schemes involving false information spread through electronic social means; hacking to obtain material non-public information or access to retail brokerage accounts; violations involving distributed ledger (i.e., blockchain) technology and initial coin offerings; and cyber threats to trading platforms and other critical market infrastructure. The announcement noted that the Cyber Unit “complements the Chairman's initiatives to implement an internal cybersecurity risk profile and create a cybersecurity working group to coordinate information sharing, risk monitoring, and incident response efforts throughout the agency.” Stephanie Avakian, co-director of the SEC's Enforcement Division, added: “The Cyber Unit will enhance our ability to detect and investigate cyber threats through increasing expertise in an area of critical national importance.” Id.
|Concerns Following Breach
As the gatekeeper of troves of non-public market data, and the protector of market integrity, the SEC has faced criticisms and concerns from many sides stemming from the revelation of the hack.
One of the most basic concerns is that the SEC itself does not appear to follow the same (or similar) cyber- and data-security measures that it demands from the entities and investors that it regulates. For instance, under guidance issued in 2011 by the SEC's Division of Corporation Finance, companies may be obligated to timely disclose material information regarding cyber incidents as well as cyber risks. The SEC's delay in disclosing the 2016 hack as well as the initial lack of details it provided mirror the dilemmas many companies face about the disclosure of the “who, what, when, and how” of cyberattacks. Most troubling of all, Chairman Clayton suggested that the Commissioners and senior-level SEC staff were not informed about the 2016 hack until it was discovered by his recent review. Amidst all this news, one lawmaker went so far as to urge the SEC to delay its planned November 2017 launch of the Consolidated Audit Trail, which would track and collect all trading activity in equities and options across all U.S. markets, citing the recent disclosure of the EDGAR hack and the SEC's cybersecurity risks. Hearing entitled “Examining the SEC's Agenda, Operations, and Budget” before Members of the Committee on Financial Services, United States House of Representatives, Oct. 4, 2017. Similarly, the Investment Company Institute, a global investor group, called for an independent investigation into the EDGAR hack and urged the SEC to delay new data-gathering rules set to take effect at the end of the year that require funds to file monthly statements with their portfolio holdings confidentially with the SEC. Since the EDGAR hack was made public, reports have emerged that the U.S. Government Accountability Office (GAO) criticized and warned the SEC in July 2017 that it had not fully implemented an intrusion-detection capability and other security measures that the GAO previously recommended. Michelle Price, “Investor group seeks probe into SEC hack, urges data rules delay,” Reuters, Sept. 22, 2017. And it is still not known whether illegal trading on the basis of hacked information actually occurred.
Notwithstanding these concerns, it is clear that the SEC is focusing on cybersecurity at all levels of its operations, making cybersecurity readiness a key element of the examinations it conducts, and studying cyber-based threats against itself and the entities and persons it regulates. Given the stakes to the public and to our securities markets, this should certainly be among the agency's highest priorities.
Margaret A. Dale and Mark D. Harris are partners at
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllThe Unraveling of Sean Combs: How Legislation from the #MeToo Movement Brought Diddy Down
When It Comes to Local Law 97 Compliance, You’ve Gotta Have (Good) Faith
8 minute readTrending Stories
- 1The Tech Built by Law Firms in 2024
- 2Distressed M&A: Mass Torts, Bankruptcy and Furthering the Search for Consensus: Another Purdue Decision
- 3For Safer Traffic Stops, Replace Paper Documents With ‘Contactless’ Tech
- 4As Second Trump Administration Approaches, Businesses Brace for Sweeping Changes to Immigration Policy
- 5General Warrants and ESI
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250