A hacker gained access to 100 million Capital One credit card applications and accounts

Posted on
bulldogtech it support

Read Article at CNN Business

New York (CNN Business)
In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customers\’ accounts and credit card applications earlier this year.

Paige Thompson is accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, in addition to an undisclosed number of people\’s names, addresses, credit scores, credit limits, balances, and other information, according to the bank and the US Department of Justice.
A criminal complaint says Thompson tried to share the information with others online. The 33-year-old, who lives in Seattle, had previously worked as a tech company software engineer for Amazon (AMZN) Web Services, the cloud hosting company that Capital One was using, the Justice Department said. She was able to gain access by exploiting a misconfigured web application firewall, according to a court filing.
Thompson was arrested Monday in connection with the breach, the Justice Department said. Thompson\’s attorney could not be immediately reached for comment.
 
 
Capital One (COF) said the hack occurred March 22 and 23 and includes credit card applications as far back as 2005. The company indicated it fixed the vulnerability and said it is \”unlikely that the information was used for fraud or disseminated by this individual.\” However, the company is still investigating.
\”I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right,\” said Capital One CEO Richard Fairbank in a statement.
The breach affected around 100 million people in the United States and about 6 million people in Canada, according to Capital One.
 
However, \”no credit card account numbers or log-in credentials were compromised and over 99% of Social Security numbers were not compromised,\” the company noted.
Capital One said it will notify people affected by the breach and will make free credit monitoring and identity protection available. The company expects to incur between $100 million and $150 million in costs related to the hack, including customer notifications, credit monitoring, tech costs and legal support due to the hack.
Capital One\’s stock was down 5% in premarket trading Tuesday.

How Capital One got hacked

The criminal complaint against Thompson paints a picture of a less-than-careful suspect.
Thompson posted the information on GitHub, using her full first, middle and last name, the complaint says. She also boasted on social media that she had Capital One information.
In a channel on Slack, a chat service often used by businesses as well as other groups, Thompson explained the method she used to break into Capital One, the Justice Department alleges. She claimed to use a special command to extract files in a Capital One directory stored on Amazon\’s servers.
\”I wanna get it off my server that\’s why Im archiving all of it lol,\” Thompson allegedly posted on Slack. One person was alarmed by what Thompson found, writing that the information was \”sketchy,\” adding, \”don\’t go to jail plz.\”
Thompson made little effort to disguise her identity. She allegedly used the screen name \”erratic\” on Slack, which was the same handle she used on a Twitter account and a Meetup chatroom page.
The FBI special agent who investigated Thompson believes Thompson tweeted that she wanted to distribute Social Security numbers along with full names and dates of birth.
One person who saw the information on GitHub notified Capital One of the \”leaked data\” belonging to the company. Capital One notified the FBI, and an agent searched Thompson\’s residence on Monday. They found devices in her possession that reference Capital One and Amazon as well as other entities that may have been targets of attempted — or actual — breaches.
The complaint indicates Thompson \”recognizes that she has acted illegally.\”

Amazon Web Services Having Outages This Morning

Posted on
amazon web services

Bulldog Alert: Amazon Web Services was having connectivity issues today beginning at 7:32 AM EDT, confirmed by down detector. Issues have since been resolved and are blamed on an external internet provider. Even Amazon can have internet issues!

Let us know if you experience any connectivity issues with any of our hosted services. At this time all of our systems are running normally.

Amazon Web Services Having Outages This Morning

Two of the largest diagnostic labs: Quest & Labcorp were hacked. Was your medical data exposed?

Posted on
bulldogtech it support

Quest Diagnostics, as well as Lab Corp, two of the largest testing providers in the country, announced nearly 12+ million customers may have had personal, financial and medical information leaked due to an issue with one of its vendors.

Quest said it was notified that between Aug. 1, 2018, and March 30, 2019, that someone had unauthorized access to the systems of AMCA, a billing collections vendor.

“(The) information on AMCA’s affected system included financial information (e.g., credit card numbers and bank account information), medical information and other personal information (e.g., Social Security Numbers),” Quest said in the filing.

While customers’ broad medical information might have been compromised, Quest said AMCA did not have access to actual lab test results, and so therefore that data was not impacted. Read More at NBC

One day after Quest Diagnostics reported that nearly 12 million of its patients were potentially affected by a malicious breach of third-party bill collection vendor American Medical Collection Agency (AMCA), fellow clinical testing firm LabCorp acknowledged that roughly 7.7 million of its customers may be affected by the same incident.

Burlington, North Carolina-based LabCorp publicly disclosed the disturbing news yesterday in a Securities and Exchange Commission 8-K filing, warning that patient data it supplied to AMCA was exposed in the incident, which took place from Aug. 1, 2018 through March 30, 2019. Such information may include names, birth dates, addresses, phone numbers, dates of service, providers and unpaid balances.

Making matters worse, roughly 200,000 customers who paid LabCorp bills using AMCA’s web portal had their payment card information compromised, the LabCorp continued. According to the SEC filing, AMCA did not share the identities of these particular victims, but assured the diagnostics company that it had already begun to notify these individuals, and would offer them two years of identity protection and credit monitoring services.

Don’t Become a victim, let Bulldog protect your company’s data

OnGuard SAVED company from rogue employee

Posted on
Bulldogtech onguard remote backup

November 2018. A Brooklyn business opens for their usual days work. Employees go about their morning activities preparing for the work day. Upon starting their computers, they begin to log into their emails and fire up their software applications. One employee after the other gets similar error messages “file can’t be found” when they try to access their data. They notify management who also receives the same errors.

Bulldog Tech receives the tech call. After we remotely log into the systems, we find their entire servers data drives have been formatted! All their data has been erased! After further investigation, we found that special software was loaded onto the server that not only removes the data but security wipes the system making it nearly impossible to recover using recovery software.

Further investigation of their router logs (all server logs were erased) shows at 2:31am the previous night, an IP logged into the server using remote desktop ports. Reviewing the server we indeed found remote desktop enabled – a security risk in itself. Reviewing the finding with the owner, he realized that he released a long time employee recently – not on the best of terms. Is it possible this employee logged into their system and erased the data? Why was not all passwords and remote access turned off after termination? Good questions owner could not answer nor though of.

What again could have been a major disaster was quickly rectified by OnGuard Remote Backup! OnGuard Remote Backup was able to restore all customer data quickly and put them back in business!

We discussed with owner to use our additional services of OnGuard Defender, and security auditing as well as put in place an employee manual that addresses items upon termination. Basically a security checklist! Its your business, only you can protect it!

Call us Today: 718-921-6159

sales@bulldogtechinc.com

 

 

 

Plumbing Company Becomes Encryptionware Victim

Posted on
Bulldogtech onguard remote backup

We received a call this week from a long time customer, a plumbing company that relies on SAP software to conduct their business; stating they could not access their server drive. Theyre business was stopped in it’s tracks.

Encryptionware garbled (encrypted) all the data including their SQL databases. We instructed them to immediately power down the system while we logged in to each workstation and ran a full virus scan. We found one of the receptionists initially was infected via an email attachment (via AOL), which executed code that scanned for accessible drives and encrypted any data found.

This customers business was stopped! Their service techs did not have access to their stops, accounting data was lost and the local attached backup drive was found to also be encrypted.

What could have been a major disaster, was mitigated by Bulldogs OnGuard Remote Backup. After our technicians reloaded the main server, ONGuard was able to recover all data files & SQL databases within 20 hours from the previous nights backup.

After less than a day, our customer was back in business thanks to OnGuard backup.

As a result, we discussed with the customer to migrate away from AOL email and move to our secure exchange servers as well as use our OnGuard Defender package to help mitigate future attacks.

This was a Win-Win for all!

If your data secure? Learn more about our OnGuard Remote Backup and protect your company today!

Call Us: 718-921-6159

sales@bulldogtechinc.com