{"id":39369,"date":"2019-07-30T11:40:52","date_gmt":"2019-07-30T11:40:52","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2019\/jul\/30\/capital-one-confirms-data-breach-cites-cloudy-approach-key-swift-resolution\/"},"modified":"2019-07-30T11:40:52","modified_gmt":"2019-07-30T11:40:52","slug":"capital-one-confirms-data-breach-cites-cloudy-approach-as-key-to-swift-resolution","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/capital-one-confirms-data-breach-cites-cloudy-approach-as-key-to-swift-resolution\/","title":{"rendered":"Capital One confirms data breach, cites cloudy approach as key to swift resolution"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/iStock-647507636.jpg\"><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Capital One has confirmed a &lsquo;data security incident&rsquo; which affected more than 100 million customers in the US and Canada &ndash; and while Amazon Web Services (AWS) has been identified as the receptacle in which the data was stolen, both customer and vendor appear not to be to blame.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Paige A. Thompson, otherwise known as &lsquo;erratic&rsquo;, was arrested on Monday and appeared in court in Seattle on a charge of computer fraud and abuse. According to the criminal <a href=\"https:\/\/www.justice.gov\/usao-wdwa\/press-release\/file\/1188626\/download\" style=\"color:#0563c1; text-decoration:underline\">complaint document (pdf)<\/a>, a &lsquo;firewall misconfiguration&rsquo; ensured the vulnerability of the Capital One cloud server.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">On July 17, a previously unknown individual emailed Capital One&rsquo;s responsible disclosure address pointing it to a GitHub account where leaked data resided. &ldquo;Capital One determined that the [file] contained the IP address for a specific server,&rdquo; the document notes. &ldquo;A firewall misconfiguration permitted commands to reach and be executed by that server, which enabled access to folders or buckets of data in Capital One&rsquo;s storage space at the Cloud Computing Company.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">That cloud computing company, it was later confirmed, was Amazon. The original email, alongside a Slack message purportedly from Thompson, mentioned S3, AWS&rsquo; primary storage product. Amazon <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-07-29\/capital-one-data-systems-breached-by-seattle-woman-u-s-says\" style=\"color:#0563c1; text-decoration:underline\">confirmed this to Bloomberg<\/a>, adding that the data &lsquo;wasn&rsquo;t accessed through a breach or vulnerability in AWS systems.&rsquo; AWS also confirmed that Thompson had previously been an employee of the company, last working there in 2016.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Capital One is a well-known AWS customer; the company selected Amazon as its &lsquo;predominant cloud infrastructure provider&rsquo; in 2016, with the news <a href=\"https:\/\/www.businesswire.com\/news\/home\/20161129006308\/en\/Capital-Selects-AWS-Predominant-Cloud-Infrastructure-Provider\" style=\"color:#0563c1; text-decoration:underline\">announced<\/a> in conjunction with AWS&rsquo; re:Invent customer gathering. The financial services provider said at the time it was advocating a cloud-first mindset, with plans to migrate the majority of its core business and customer applications to AWS over the coming five years.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">From Capital One&rsquo;s perspective, the company praised its cloud-first system for the speed at which it was able to remediate the incident. Putting together a specific question-and-answer on the subject <a href=\"https:\/\/www.prnewswire.com\/news-releases\/capital-one-announces-data-security-incident-300892738.html\" style=\"color:#0563c1; text-decoration:underline\">in its press materials<\/a>, Capital One wrote: &ldquo;This type of vulnerability is not specific to the cloud. The elements of infrastructure involved are common to both cloud and on-premises data centre environments.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">&ldquo;The speed with which we were able to diagnose and fix this vulnerability, and determine its impact, was enabled by our cloud operating model.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Capital One noted that no credit card account numbers or login credentials were compromised, as well as less than 1% of social security numbers. The press materials curiously noted that &lsquo;no bank account numbers or social security numbers were compromised, other than&hellip; about 140,000 social security numbers of&hellip; credit card customers.&rsquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Alex Heid, chief research officer at SecurityScorecard, described the company&rsquo;s response as &lsquo;commendable&rsquo;, particularly in its disclosure and bug hunting practices, but added a caveat. &ldquo;From the standpoint of any business handling large amounts of data, the use of third-party hosting services within cloud computing environments is an unavoidable reality of the modern era,&rdquo; said Heid. &ldquo;The attack perimeter of a network goes beyond the organisation itself and is often intertwined with a collection of third-party vendors.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">&ldquo;In addition to making use of a continuous monitoring service for all external assets is an important part of understanding the scope, implementing a bug bounty reporting program will go a long way in making sure there&rsquo;s always an &lsquo;extra set of eyes&rsquo; on assets of value.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">You can take a look at the Capital One page dedicated to the incident <a href=\"https:\/\/www.capitalone.com\/facts2019\/\" style=\"color:#0563c1; text-decoration:underline\">here.<\/a><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Capital One has confirmed a &lsquo;data security incident&rsquo; which affected more than 100 million customers in the US and Canada &ndash; and while Amazon Web Services (AWS) has been identified as the receptacle in which the data was stolen, both cu&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39369","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=39369"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39369\/revisions"}],"predecessor-version":[{"id":39370,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39369\/revisions\/39370"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=39369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=39369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=39369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}