Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/13/2019
09:00 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Lessons Learned from 7 Big Breaches in 2019

Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
3 of 8

Cloud Storage Risks are Real
Organization: Capital One
When: July 2019
Breach Details: Personal information belonging to over 100 million US individuals and 6 million Canadian residents was exposed when a former employee at AWS inappropriately accessed the data. Compromised information included names, addresses, dates of birth, credit scores, payment history contact information, and other data on people who had applied for a Capital One credit card dating back to 2005. Also exposed were the Social Security Numbers of 140,000 individuals and bank account data belonging to 80,000 secured credit card customers.
Lessons Learned: The Capital One data breach resulted from a misconfigured Web application firewall that gave the attacker a way to execute privileged commands on the cloud server hosting the data.  'Cloud storage is an increasingly attractive option for large corporations because it is cheaper than on premise,' said Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies. But many companies are putting data at risk by failing to adopt security with the same vigor that they apply to on-premise infrastructure. 'They should, otherwise the financial cost of penalties and lawsuits will vastly outweigh any IT savings.' 
Image source: Capital One

Cloud Storage Risks are Real

Organization: Capital One

When: July 2019

Breach Details: Personal information belonging to over 100 million US individuals and 6 million Canadian residents was exposed when a former employee at AWS inappropriately accessed the data. Compromised information included names, addresses, dates of birth, credit scores, payment history contact information, and other data on people who had applied for a Capital One credit card dating back to 2005. Also exposed were the Social Security Numbers of 140,000 individuals and bank account data belonging to 80,000 secured credit card customers.

Lessons Learned: The Capital One data breach resulted from a misconfigured Web application firewall that gave the attacker a way to execute privileged commands on the cloud server hosting the data. "Cloud storage is an increasingly attractive option for large corporations because it is cheaper than on premise," said Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies. But many companies are putting data at risk by failing to adopt security with the same vigor that they apply to on-premise infrastructure. "They should, otherwise the financial cost of penalties and lawsuits will vastly outweigh any IT savings."

Image source: Capital One

3 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
amdenver
100%
0%
amdenver,
User Rank: Apprentice
1/26/2020 | 8:14:03 PM
Great Concise Article
Author has done an excellent job of capturing the main avenues of getting breached with very good case selection. Great succinct read. Thanks for the time and effort that you put into this worth. Best Regards.
Matt Middleton-Leal Netwrix
50%
50%
Matt Middleton-Leal Netwrix,
User Rank: Apprentice
12/20/2019 | 9:37:05 AM
Cloud data security is a huge concern
Great article. We can all learn from the mistakes made in these big breaches. In particular, I agree that there is continued concern about the risks of cloud storage. In a recent survey, 48% of organizations that store sensitive data in the cloud would consider moving that data back on premises. To best secure data in the cloud, it's important to know just how much data you have, who has access to it and which data is most critical in your IT environment, so you can prioritize your security efforts.
albertscales
0%
100%
albertscales,
User Rank: Apprentice
12/16/2019 | 9:05:30 AM
informative
Nice article
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21196
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21197
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.