Introduction.
The “big three” credit reporting companies, TransUnion, Equifax, and Experian, hold highly sensitive consumer financial data that can affect people’s access to credit, housing, employment, and insurance. Their data security posture depends not only on resisting large-scale hacking events, but also on preventing “low-tech” account takeovers that exploit customer service processes.
This post is based on Shira Ovide’s article, “It Wasn’t Hard to Highjack Trans Union Credit Reports, I Did it Myself. published in Tech Friend , a publication of the The Washington Post on December 12. 2025. In her article, drawing on months of testing by the Public Interest Research Group (PIRG), Ovide describes a vulnerability in TransUnion’s customer service hotline that allegedly allowed callers, with minimal identity proof, to reset passwords and change account contact information, potentially enabling account takeover and unauthorized access to credit report details. TransUnion reported that it updated protocols after being contacted, and PIRG later found that additional verification was requested in most retests.
This episode underscores a broader point of concern regarding all credit reporting companies. Even when companies invest in cybersecurity, authentication and customer support, workflows can become weak links, especially in an environment where criminals can readily obtain personal identifiers such as Social Security numbers and dates of birth.
1) What private records do credit bureaus hold, and why does security matter?
The three national credit reporting agencies collect and compile data about individuals’ financial lives: credit accounts, payment history, personal identifiers, addresses, public records such as bankruptcies, and other items used to generate credit files and scores. Those records:
-
Influence major life outcomes (mortgages, rentals, sometimes jobs, insurance pricing).
-
Provide a “toolkit” for criminals: a credit report can help refine phishing, facilitate identity theft, and support fraud (e.g., lifting a credit freeze to seek credit in another person’s name).
Because these firms operate as gatekeepers to core identity and financial data, security failures have consequences far beyond a single account: they can scale to systemic consumer harm.
2) Key question: How secure is access to your data from unauthorized users?
Security is not a single feature; it is a layered system. For consumer credit report accounts, unauthorized access commonly occurs through at least four pathways:
-
System breaches and exploitation of technical vulnerabilities
Large-scale intrusions (e.g., the well-known Equifax incident in 2017) can expose data even if individual consumer accounts have strong passwords. -
Account takeover (ATO) through weak authentication or customer support “social engineering” attackers can impersonate consumers, reset credentials, change account emails/phone numbers, and then access reports or manage freezes.
-
Credential stuffing and reused passwords
If consumers reuse passwords, attackers can leverage credentials leaked elsewhere. -
Insider risk and third-party vendor exposure
Sensitive records may be accessed improperly by insiders or through vendors with weaker controls.
Ovide’s report focuses on pathway #2: customer service-enabled account takeover.
3) Case study from the Ovide article: TransUnion customer service and the risk of account takeover
What PIRG found (as reported by Ovide)
According to Ovide’s reporting, PIRG staff spent months testing TransUnion’s protections and found they could persuade customer service representatives to:
-
Reset passwords, and
-
Change account contact information using “bare-bones proof of identity.” The reported minimum data requested in many instances included a Social Security number and other personal details.
PIRG’s concern was that such information is widely available to criminals via data brokers, prior breaches, or underground markets. A successful takeover could let an impostor view the consumer’s credit report information without the legitimate user knowing, potentially enabling follow-on fraud (like lifting a freeze) and better-targeted phishing.
Ovide’s own test
Ovide reports that she personally attempted the method: after providing identifying information requested by the representative, she was able to reset her password and change the email on file. Notably, she had a PIN and a security question set up, but neither she nor PIRG testers were asked for those factors during the calls described.
What changed afterward
After Ovide shared PIRG’s findings with TransUnion (reported as occurring in September), TransUnion stated it changed its security protocols. PIRG retested later and, in most cases, representatives asked for additional verification (e.g., security questions or knowledge-based questions) before changing account information.
Why this matters
Even if the data vault is well protected, a weak identity verification step at the “front desk” can undermine the whole system. Put simply: if someone can get customer support to hand over the keys, technical perimeter defenses may not matter.
4) How should identity verification work for credit bureau accounts?
Ovide quotes a digital security expert (Lorrie Cranor of Carnegie Mellon University) warning that phone based resets using basic personal identifiers can leave consumers “extremely vulnerable,” because criminals can obtain those identifiers.
A more secure approach described in the reporting includes:
-
Stronger verification before resetting credentials or changing account email/phone
-
Use of identity verification services that ask multiple questions derived from credit history or related sources (knowledge-based verification), and/or other methods to establish identity.
Important caveat: knowledge based questions are not perfect (data can be stolen; some questions can be guessed; legitimate users can fail). Still, the report’s core point stands: relying primarily on SSNs and basic identifiers is widely viewed as insufficient.
5) Notifications: the “silent takeover” problem
Another security issue highlighted in Ovide’s report: lack of reliable alerts to consumers when key account details change.
If an attacker changes the email or phone number on file, and the company fails to notify the consumer via the previous contact points then the takeover may remain invisible. That increases the risk window for:
-
Viewing the credit report,
-
Changing freeze settings, and
-
Using details for targeted fraud.
Best practice in many systems send security alerts to the old email/phone whenever account recovery or contact changes occur, and to provide a rapid way to dispute/reverse changes.
6) What this suggests about the “big three” overall
Although the specific vulnerability described involves TransUnion’s phone process, the broader lesson applies across TransUnion, Equifax, and Experian:
-
These companies sit on high value data and therefore face persistent attack pressure.
-
Security must cover both technical defenses and human-process defenses (customer service scripts, training, escalation, monitoring).
-
Account recovery is a recurring weak point: companies must balance consumer convenience with robust verification, and that balance can tilt dangerously toward convenience.
This does not prove that Equifax and Experian use the same practices described for TransUnion, but it does show why consumers and regulators should ask:
What are each bureau’s current authentication standards for password resets, contact changes, and freeze lifting, and how are they audited?
7) Practical consumer takeaways
Consumers cannot directly control bureau internal security, but they can reduce risk:
-
Create and keep separate logins for each bureau (don’t reuse passwords).
-
Use unique, strong passwords and a password manager if possible.
-
Turn on additional verification options offered (PINs, security questions, MFA if available).
-
Consider keeping a credit freeze active (and record your PINs or recovery steps securely).
-
Periodically check each bureau account for unexpected changes (email/phone/address) and review your credit reports as appropriate.
8) Questions for credit bureaus, policymakers, and consumer advocates
Based on the issues raised in Ovide’s reporting, the most important governance questions include:
-
Authentication standards: What specific identity verification is required before password resets and contact changes? Is SSN plus basic identifiers still sufficient in any channel (phone, web chat, etc.)?
-
Change notifications: Are alerts sent to the previous email/phone when the account email/phone is changed? Are there “cooling off” periods before sensitive actions (like lifting a freeze) take effect after a contact change?
-
Quality control and monitoring: How does the company audit customer service interactions to detect patterns consistent with social engineering or account takeover attempts?
-
Independent testing: Does the company conduct regular red-team exercises that include customer support channels, not just network security?
-
Remediation and transparency: If a vulnerability existed, how does the company assess whether accounts were compromised, and how are affected consumers notified?
Conclusion
The TransUnion hotline vulnerability described by Shira Ovide (The Washington Post),based on PIRG’s testing and Ovide’s own experience, illustrates a core security reality for the credit reporting system: the strongest technical controls can be undermined by weak identity verification in customer support pathways. TransUnion’s reported protocol changes are a positive step, but the episode highlights the need for persistent oversight, robust account-change notifications, and regular independent testing across all three major bureaus. For consumers, the practical message is to treat bureau accounts as high-risk identity assets and secure them accordingly; for policymakers and advocates, the priority is ensuring that the gatekeepers of America’s credit infrastructure meet consistently high standards for access control and accountability.
Criminal Law Library Blog

