August 8, 2019 Breach

On July 29, 2019, Capital One Financial Corporation disclosed that a data breach had exposed the personal information of approximately 106 million individuals across the United States and Canada. The breach was carried out by Paige Thompson, a former Amazon Web Services (AWS) software engineer, who exploited a misconfigured web application firewall (WAF) to access Capital One's data stored on AWS. The incident became a landmark case in understanding the shared responsibility model of cloud computing and the third-party risks inherent in cloud infrastructure.

The Attack: Server-Side Request Forgery

Thompson exploited a server-side request forgery (SSRF) vulnerability in a misconfigured WAF that Capital One had deployed on its AWS infrastructure. The misconfiguration allowed the WAF to be tricked into making requests to the AWS metadata service, which returned temporary credentials associated with an IAM role. That role had overly broad permissions to access Capital One's S3 storage buckets containing customer data.

The attack occurred on March 22 and 23, 2019. Thompson used the obtained credentials to list the contents of Capital One's S3 buckets and then downloaded data from those buckets. She later posted about the breach on social media and in public Slack channels, which led to a tip from a security researcher to Capital One's responsible disclosure program on July 17, 2019.

Impact Category Details
Records Exposed (U.S.) Approximately 100 million individuals
Records Exposed (Canada) Approximately 6 million individuals
Social Security Numbers Approximately 140,000
Bank Account Numbers Approximately 80,000
OCC Fine $80 million
Class Action Settlement $190 million

What Was Exposed

The compromised data included credit card application information dating back to 2005. This encompassed names, addresses, phone numbers, email addresses, dates of birth, and self-reported income. For some applicants, the data also included Social Security numbers (approximately 140,000), linked bank account numbers (approximately 80,000), credit scores, credit limits, balances, and payment history. In Canada, approximately 1 million Social Insurance Numbers were compromised.

The Shared Responsibility Problem

The Capital One breach brought the cloud shared responsibility model into sharp public focus. Under this model, the cloud provider (AWS, in this case) is responsible for security "of" the cloud — the underlying infrastructure, compute, storage, and networking. The customer (Capital One) is responsible for security "in" the cloud — including how they configure their services, manage access controls, and protect their data.

The misconfigured WAF and the overly permissive IAM role were Capital One's responsibility, not AWS's. However, the incident raised questions about whether cloud providers should implement additional guardrails to prevent common misconfigurations, particularly for the metadata service endpoint that Thompson exploited. AWS subsequently released IMDSv2 (Instance Metadata Service Version 2), which provides additional protections against SSRF attacks by requiring session-oriented requests.

TPRM Lesson Learned: Cloud infrastructure is a third-party dependency, and the shared responsibility model means that organizations cannot delegate security accountability to their cloud provider. Effective third-party risk management for cloud environments requires understanding exactly where the provider's responsibility ends and yours begins. TPRM assessments for cloud-deployed applications must evaluate configuration management practices, IAM policies, network segmentation, and whether the organization has the expertise to securely operate in its chosen cloud environment. The Capital One breach shows that even sophisticated financial institutions with dedicated cloud security teams can miss critical misconfigurations.

Legal Consequences

Paige Thompson was arrested on July 29, 2019, the same day Capital One publicly disclosed the breach. She was indicted on charges of computer fraud and abuse, wire fraud, and access device fraud. In June 2022, a federal jury in Seattle convicted Thompson on seven counts, including wire fraud and unauthorized access to a protected computer. She was sentenced in October 2022.

Capital One faced significant regulatory and legal consequences. The Office of the Comptroller of the Currency (OCC) assessed an $80 million civil money penalty against Capital One in August 2020, citing the bank's failure to establish effective risk assessment processes before migrating significant IT operations to the cloud. The OCC specifically noted deficiencies in Capital One's risk management for cloud-based operations. Capital One also agreed to a $190 million class action settlement with affected consumers.

Implications for Vendor Risk Management

The Capital One breach offers critical lessons for organizations managing vendor risk in cloud environments:

The Capital One incident ultimately demonstrated that migrating to the cloud does not transfer risk — it transforms it. Organizations must evolve their third-party risk management programs to account for the unique risk dynamics of cloud infrastructure, including the configurations, access controls, and monitoring practices that remain firmly within the customer's domain of responsibility.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. Seattle Tech Worker Convicted of Wire Fraud and Computer Intrusions - U.S. Department of Justice, June 2022
  2. Capital One data breach: A hacker gained access to 100 million credit card applications - CNN Business, July 2019
  3. OCC Assesses $80 Million Civil Money Penalty Against Capital One - Office of the Comptroller of the Currency, August 2020
  4. Information on the Capital One Cyber Incident - Capital One, July 2019
  5. The Capital One Data Breach (In Retrospect) - MIT Sloan CAMS Working Paper, 2020