Skip to main content

Capital One data breach: 106m customers affected; suspected hacker arrested

Capital One Financial Corporation, a United States-based bank holding company has suffered a massive data breach in which personal and financial data of over 106 million customers has been accessed and stolen.
Out of 106 million, 100 million customers are US-based while 6 million are from Canada. The data breach took place on March 22nd and 23rd earlier this year but the company identified the incident on July 19, 2019.
According to a press release from the company, the data accessed in the breach includes information on customers who applied for the company’s credit card from 2005 through early 2019. This information includes names, addresses, phone numbers, email addresses, zip/postal codes, dates of birth and self-reported income.
Furthermore, credit scores, payment history, limits, balances and contact information of the company’s credit card users were also accessed by the hacker. Approximately, 140,000 social security numbers of credit card customers and about 80,000 linked bank account numbers of secured credit card customers were also among breached data.

The alleged hacker has been caught

While Capital One’s incident can be considered as one of the largest data breachesin the financial world, the alleged hacker behind the hacking saga has been arrested by authorities.
The US justice department has acknowledged that Paige Adele Thompson (33) was arrested on Monday by the FBI from Seattle and charged with computer fraud and abuse.
Paige Adele Thompson
Paige Adele Thompson
Thompson who was a software engineer by profession used a Slack channel to brag about the hack and posted a list of files allegedly stolen from Capital One. 
According to a statement issued by US attorney, “On July 17, 2019, a GitHub user who saw the post alerted Capital One to the possibility it had suffered a data theft.” 
It is unclear whether the stolen data was misused or shared with anyone else however investigations are underway. If convicted, Thompson will face a maximum sentence of five years in prison and a $250,000 fine.
“While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened,” said Richard D. Fairbank, Chairman, and CEO. “I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right.”
According to resume seen by Heavy, Thompson worked for Amazon a systems engineer in 2015 and 2016. It is worth noting that Capital One’s server was hosted on Amazon Web Services which has been lately making headlines for exposing medical, influencers, social media, personal, financial and military data online.
Steve Armstrong, Regional Director UK, Ireland & South Africa at Bitglass told Hackread that: “Access to cloud data repositories should be controlled by contextual access control as a bare minimum – by first identifying the user, the device and location of access organizations can take policy-based remediation of these types of issues.”
“Furthermore, data-centric controls should be applied – data encryption tied to the data owners key management system would have gone some way to mitigating the risk of plain text data being stolen. By tying this to IaaS posture management to ensure that S3 buckets are secured in line with best practice the risk to the data would have been mitigated.”
In a detailed comment, Adrien Gendre, Chief Solution Architect at Vade Secureanswered several questions related to the breach. 
Q: So many people were impacted by this breach; should anyone with a Capital One account be worried?
A: “Capital One has already posted a notice within its customer portal, disclosing the breach and saying that they will “notify affected individuals through a variety of channels.” Rather than wait to find out whether you’re among the unlucky 100 million, I would advise proactively changing your Capital One password. And if that same password is used across multiple online accounts, change your password for each of those services. Although passwords weren’t mentioned in the reported list of breached information, it’s better to be safe than sorry.”
“On a positive note, Capital One customers have free access to Credit Wise credit monitoring, which includes alerts for credit-report changes, use of your SSN with a different name or address, or dark web activity associated with your identity. I would pay extra attention to the service in the coming days and weeks, so you’re able to identify and react quickly to any suspicious or fraudulent activity,” said Gendre.
Q: After breaches like this, the company typically sends out disclosure notices. Do you think cybercriminals will take advantage and conduct phishing campaigns around it?
“Phishers love to capitalize on fear and uncertainty—and a breach represents a prime opportunity to strike. Spooked by reports of the breach, consumers may be more inclined to respond to an “urgent” email purporting to be from “Capital One Security”. The email might claim that their account was locked due to suspicious activity and request them to authorities immediately to regain access. Or it could push the customer to sign up for an additional monitoring service or protection that’s only available for limited time because of the breach. Either way, sense of urgency is a hallmark of phishing attacks.”
Q: What should consumers (Capital One customers in particular) do following this breach?
“To avoid being further victimized by the Capital One breach, consider the following advice:
  • Change your Capital One password as a precautionary measure. If that same password is used across multiple online accounts, change your password for each of those services. Always use a strong password that is unique for each online account or service.
  • Take advantage of the Credit Wise service offered to Capital One customers already to monitor for suspicious or fraudulent activity.
  • Be extra vigilant with emails that appear to be coming from Capital One as they might be a phishing attack. Pay attention to the following:
o   Many experts point to bad grammar and typos as tell-tale clues of phishing. This advice is outdated. Sophisticated phishing attacks use emails and web pages that are well written and virtually indistinguishable from the real thing.
o   The most important element of an email to inspect is the link. Phishers will uselook-alike cousin domains, adding words (e.g. CapitalOne-Global.com) or changing spellings (e.g. Capital0ne.com with a zero) so they look deceptively similar to the impersonated brand. They might also create a domain that’s long, complex and encompasses several known domains in an attempt to confuse the recipient.
o   Be extra vigilant when checking email from your phone. On mobile devices, the sender’s name is usually displayed but the email address is not. You might get an email on your phone that looks like it’s from “Capital One Security,” but the actual email address it comes from is xyz22@gmail.com – a technique called visible alias spoofing. The phishers assume that most busy people won’t expand the sender to check the email address carefully.”

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...