. | . |
'Amateur' Capital One hack stuns security community By Rob Lever Washington (AFP) July 30, 2019 The massive data breach at Capital One appeared to be an unsophisticated attack from a single hacker, raising questions about the security of the financial system and insider threats to cloud computing. The motive behind the breach and extent of its impact remained unclear Tuesday, a day after FBI agents arrested 33-year-old former web engineer Paige Thompson and charged her with stealing data from more than 100 million credit card applications from the 10th largest US bank. "The biggest surprise is the amateur nature of the attack," said John Dickson of the security consultancy Denim Group. Dickson said it was "absolutely earth-shattering" that an individual attacker could gain access to that much data at one of the largest US financial institutions. "This could have a major impact on confidence in the banking system." The Capital One hack appears to be different from major breaches at the credit monitoring firm Equifax, internet giant Yahoo and other major incidents which have been attributed to sophisticated nation-state entities. US authorities said Thompson, a former Amazon Web Services employee, was arrested on the basis of a tip after she boasted of accessing the data on the software sharing site GitHub as well as on Twitter and Slack. Darren Hayes, a Pace University computer science professor specializing in cybersecurity, said the ability to quickly arrest and prosecute an attacker in this kind of case is unusual. "Most of these cases are perpetrated by hackers in other countries," he said. - 'Good people gone bad' - Hayes said the incident highlights the risk of "insider" attacks when trusted employees turn to theft. "It is challenging to catch good people gone bad, so a lot of banks look for that now" with artificial intelligence tools to detect anomalies in employee behavior, Hayes said. Capital One said the incident affected some 100 million US customers and six million Canada, with as many as 140,000 US and one million Canadian social security numbers compromised. Only some of the data was encrypted, but Capital One said it had no indication any of the data was transferred or sold where it could be damaging for customers. Still, Hayes said he sees a risk of data loss that could end up compromising bank customers. "My sense is that we are going to see a lot of class-action lawsuits and the company could be liable for a lot of damages," he said. News of the Capital One breach comes after US credit monitoring agency Equifax last week agreed to pay up to $700 million to settle a similar incident that hit the company in 2017, affecting nearly 150 million customers. New York State attorney general Letitia James said her office was opening up its own investigation. "My office will begin an immediate investigation into Capital One's breach, and will work to ensure that New Yorkers who were victims of this breach are provided relief," James said. - 'Easier target' - Dylan Gilbert of the consumer group Public Knowledge said the news raises questions about security procedures by the large bank. "Why didn't Capital One fully encrypt this data, and why didn't the company place this vast trove of personal information behind a properly configured firewall?" Gilbert said. "Security is challenging and mistakes happen, but unfortunately for consumers, companies have no incentive to engage in cybersecurity best practices when punishment comes in the form of financial penalties that can be factored in as a mere cost of doing business." Joseph Hall, chief technologist at the Center for Democracy & Technology, said the incident highlights the risk of depending too much on cloud computing, which stores vast amounts of data in servers. "The fact that there is so much more data in the cloud makes it an easier target," Hall said. "If cloud services are misconfigured it's relatively easy for someone walking by to take advantage of that." Thompson's online resume indicates she left Amazon in 2016, and there was no indication the AWS cloud itself was to blame for the breach. "AWS was not compromised in any way and functioned as designed," Amazon said in a statement. "The perpetrator gained access through a misconfiguration of the web application and not the underlying cloud-based infrastructure. As Capital One explained clearly in its disclosure, this type of vulnerability is not specific to the cloud."
China accuses FedEx of 'holding up' Huawei parcels Beijing (AFP) July 26, 2019 China accused FedEx of deliberately "holding up" the delivery of more than 100 Huawei packages after the US firm misrouted some parcels from the telecom giant, state media said Friday. The ongoing tussle between the two firms comes as Beijing and Washington face off in a trade war in which both sides have exchanged steep tariffs on hundreds of billions of exports. FedEx apologised in May for "misrouting" what it said was a "small number" of Huawei packages. Huawei said at the time it would r ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |