4.8 • 1K Ratings
🗓️ 13 February 2020
⏱️ 27 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hi and welcome to malicious life in collaboration with cyberism. |
0:35.0 | On March 22nd, 2019, Page Thompson broke into the database of Capital One Bank. The next day she walked away with social security numbers, bank account numbers and other personal information for over 100 million people. How could one person steal so much information from an institution of this scale? |
0:42.0 | We, the public, have to trust banks with our most sensitive |
0:46.8 | personal data. Yet something was obviously wrong with how Capital One protected that data. |
0:54.0 | Like a babysitter who lost the kids, Capital One breached the public's trust. |
1:00.0 | Except Capital One's story isn't only about corporate negligence. |
1:08.0 | Large-scale cybersecurity, particularly in the financial sector, is much more complicated than it appears |
1:16.4 | at first glance. |
1:18.5 | Banks are huge targets, fending off hundreds of thousands of threats per day. |
1:24.0 | When one hacker manages to slip through the cracks, |
1:27.0 | it tells a small part of a much larger story. |
1:31.0 | Banks hire people to prevent hacks. Some of them, such as those implicated |
1:37.1 | in Capital One's hack, have failed miserably. Others have done much better thus far. The approaches they've come up with are, in some |
1:47.8 | cases, quite extraordinary. failure an improvement. Last year's hack of Capital One provides insight into how not to protect banks |
2:07.0 | against cyber threats. So what exactly happened? In this case, Capital One used Amazon Web Services, |
2:15.0 | AWS, to house customer data in the cloud. |
2:18.0 | The data was protected by a web application firewall, designed to prevent common cyber attacks. |
2:26.0 | But Capital One's firewall was improperly configured, so it didn't properly validate the commands it received. |
2:34.0 | This vulnerability allowed Page Thompson to forge a request to the improperly configured servers |
2:40.0 | and have them exfiltrate all user data. |
2:44.0 | But only a certain kind of hacker would have known about such a vulnerability, the kind of hacker |
2:50.1 | with insider knowledge, like Paige Thompson, whose most recent job was as a software engineer for AWS. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.