> series: anatomy_of_a_breach —— part: 127 —— target: capital_one —— records: 106,000,000 —— method: ssrf_via_misconfigured_waf<span class="cursor-blink">_</span>_
On 29 July 2019, Capital One disclosed that a security breach had exposed the personal data of approximately 106 million credit card customers and applicants in the United States and Canada. The stolen data included names, addresses, phone numbers, dates of birth, self-reported income, credit scores, and — for approximately 140,000 customers — Social Security numbers, and for 80,000 — bank account numbers.
The attacker was Paige Thompson, a former AWS employee who understood the cloud infrastructure that Capital One ran on. Thompson exploited a Server Side Request Forgery (SSRF) vulnerability in Capital One's Web Application Firewall (WAF) to access the AWS metadata service, obtain temporary security credentials, and use those credentials to access S3 buckets containing customer data. The attack was a textbook cloud-native exploitation chain — and it established cloud misconfiguration as the dominant breach vector for organisations that had migrated to the cloud.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Capital One breach established that cloud migration — while offering many security benefits — introduces new vulnerability classes that require cloud-specific security expertise. SSRF, metadata exploitation, IAM privilege escalation, and S3 bucket misconfiguration are the cloud equivalents of the SQL injection, default credentials, and network segmentation failures that have appeared throughout this series. The attack surface has changed; the need for testing has not.
Our cloud configuration reviews assess AWS, Azure, and GCP security posture. Web application testing includes SSRF assessment. Cyber Essentials addresses cloud service security. SOC in a Box monitors cloud environments for anomalous API calls and data access patterns. And UK Cyber Defence provides incident response for cloud-native breaches.
Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> assess SSRF, metadata, IAM, and storage security. <a href="/cyber-essentials">Cyber Essentials</a> addresses cloud service security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors cloud environments.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call