Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/13/2019
09:00 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Lessons Learned from 7 Big Breaches in 2019

Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
3 of 8

Cloud Storage Risks are Real
Organization: Capital One
When: July 2019
Breach Details: Personal information belonging to over 100 million US individuals and 6 million Canadian residents was exposed when a former employee at AWS inappropriately accessed the data. Compromised information included names, addresses, dates of birth, credit scores, payment history contact information, and other data on people who had applied for a Capital One credit card dating back to 2005. Also exposed were the Social Security Numbers of 140,000 individuals and bank account data belonging to 80,000 secured credit card customers.
Lessons Learned: The Capital One data breach resulted from a misconfigured Web application firewall that gave the attacker a way to execute privileged commands on the cloud server hosting the data.  'Cloud storage is an increasingly attractive option for large corporations because it is cheaper than on premise,' said Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies. But many companies are putting data at risk by failing to adopt security with the same vigor that they apply to on-premise infrastructure. 'They should, otherwise the financial cost of penalties and lawsuits will vastly outweigh any IT savings.' 
Image source: Capital One

Cloud Storage Risks are Real

Organization: Capital One

When: July 2019

Breach Details: Personal information belonging to over 100 million US individuals and 6 million Canadian residents was exposed when a former employee at AWS inappropriately accessed the data. Compromised information included names, addresses, dates of birth, credit scores, payment history contact information, and other data on people who had applied for a Capital One credit card dating back to 2005. Also exposed were the Social Security Numbers of 140,000 individuals and bank account data belonging to 80,000 secured credit card customers.

Lessons Learned: The Capital One data breach resulted from a misconfigured Web application firewall that gave the attacker a way to execute privileged commands on the cloud server hosting the data. "Cloud storage is an increasingly attractive option for large corporations because it is cheaper than on premise," said Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies. But many companies are putting data at risk by failing to adopt security with the same vigor that they apply to on-premise infrastructure. "They should, otherwise the financial cost of penalties and lawsuits will vastly outweigh any IT savings."

Image source: Capital One

3 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
amdenver
100%
0%
amdenver,
User Rank: Apprentice
1/26/2020 | 8:14:03 PM
Great Concise Article
Author has done an excellent job of capturing the main avenues of getting breached with very good case selection. Great succinct read. Thanks for the time and effort that you put into this worth. Best Regards.
Matt Middleton-Leal Netwrix
50%
50%
Matt Middleton-Leal Netwrix,
User Rank: Apprentice
12/20/2019 | 9:37:05 AM
Cloud data security is a huge concern
Great article. We can all learn from the mistakes made in these big breaches. In particular, I agree that there is continued concern about the risks of cloud storage. In a recent survey, 48% of organizations that store sensitive data in the cloud would consider moving that data back on premises. To best secure data in the cloud, it's important to know just how much data you have, who has access to it and which data is most critical in your IT environment, so you can prioritize your security efforts.
albertscales
0%
100%
albertscales,
User Rank: Apprentice
12/16/2019 | 9:05:30 AM
informative
Nice article
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7622
PUBLISHED: 2020-04-06
All versions before 2.2.1 are vulnerable to HTTP Response Splitting. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
CVE-2020-9473
PUBLISHED: 2020-04-06
The S. Siedle & Soehne SG 150-0 Smart Gateway <= 1.2.3 has a passwordless ftp ssh user. By using an exploit chain, an attacker with access to the network can get root access on the gateway.
CVE-2020-1728
PUBLISHED: 2020-04-06
A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other pr...
CVE-2020-8004
PUBLISHED: 2020-04-06
STMicroelectronics STM32F1 devices have Incorrect Access Control.
CVE-2020-7631
PUBLISHED: 2020-04-06
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.