720-891-1663
Return to the list of client alerts

Every Breach Tells Us What Not To Do – If We Listen

Last week Capital One announced a breach of over 100 million credit card applications plus a smaller number of socials.  They haven’t explained why there was not a one-to-one relationship since I have never seen a credit card application that didn’t ask for a social, but that is what they say.

Time after time we see cloud breaches;  this one is also a cloud breach.  And again, it does not appear that there was a flaw or compromise in the cloud infrastructure.  What there was was a problem between the keyboard and the chair.

So what do we know so far:

  • Over 100 million records were compromised
  • The compromised server was hosted at Amazon’s AWS
  • The person who, it appears committed this crime, worked for Amazon a few years ago
  • The hacker bragged about committing the crime on social media
  • The hacker exploited a vulnerability and then used that to exploit a misconfiguration

So what was the misconfiguration?

The IAM – Identity and Access Management – service was accessible from outside the Amazon environment and even more importantly, from outside Capital One’s little world inside AWS, allowing the hacker to use the vulnerability to obtain a set of credentials that granted her access to a number of S3 buckets.  Since the service was accessible from any where on the planet, the hacker was able to download Capital One’s data.

What is the lesson?

The misconfiguration of cloud services is likely VERY common.  The hacker’s knowledge of where to look is what allowed allowed her to exploit the vulnerability.  Whether she guessed the misconfiguration or knew about it from her time at Amazon is unclear.

What is important is to spend the effort to set up the systems, processes and penetration tests, on a regular basis, to look for configuration holes.

Certainly starting with the holes that have been exploited before might be smart.

For the rest of the details of this attack, read the source article linked below.

Source: Cloudsploit