Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

AWS: No Significant Issues at Other Alleged Targets of Capital One Hacker

Capital One hacked

Capital One hacked

Amazon Web Services (AWS) has reached out to customers allegedly targeted by Paige Thompson, the individual accused of hacking Capital One Financial, but says none of them reported any significant issues.

Thompson, who used the online moniker “erratic,” has been accused of accessing the personal information of roughly 106 million people — 100 million in the United States and 6 million in Canada — including, in some cases, social security numbers and bank account numbers.

Thompson, 33, of Seattle, reportedly obtained the data from Capital One’s AWS servers after exploiting a firewall misconfiguration and a server-side request forgery (SSRF) vulnerability. Capital One, one of the biggest payment card issuers in the U.S., discovered the breach in mid-July after someone informed the company that the leaked data had apparently been hosted on GitHub.

The suspect, who was employed by AWS as a system engineer between 2015 and 2016, was arrested in late July and charged with computer fraud and abuse. A detention hearing has been scheduled for August 22.

Authorities said they found evidence that Thompson also stole data from over 30 companies, educational institutions and other entities.

In response to a letter sent by Senator Ron Wyden following the disclosure of the Capital One breach, Amazon clarified that the intrusion was possible due to a “misconfiguration error at the application layer of a firewall installed by Capital One,” and only then was a SSRF attack launched to gain access to the data.

“As discussed above, SSRF was not the primary factor in the attack,” Stephen Schmidt, VP and CISO at AWS, told Sen. Wyden. “We are not aware of any other noteworthy SSRF compromises of AWS customers. It’s possible that there have been small numbers of these that haven’t been escalated to us […], but none that we have confirmed at any significant scale, beyond Capital One.”

“We understand that the person implicated in the Capital One attack identified several other organizations that she believed she had successfully attacked in some form. We quickly reached out to those customers to make them aware of those claims, and then offered to help them assess and secure their data,” Schmidt said. “To date, these customers have not reported any significant issues.”

AWS has pointed out that organizations implementing defense-in-depth measures, which involve multiple layers of protection, would not suffer a significant breach even if they were to misconfigure a resource.

The company highlighted that it already offers several security tools and services, and it has promised to add more in the near future. It has also started scanning its customers’ firewall resources in an effort to identify potentially problematic configurations.

Related: Congress Wants Capital One, Amazon to Explain Data Breach

Related: Q&A: What to Know About the Capital One Data Breach

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.