4.9 • 9 Ratings
🗓️ 24 June 2022
⏱️ 21 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, it's great to see you. Welcome back to Mlex's weekly podcast covering the top regulatory stories of the moment with the assistance of our team of reporters around the globe. My name is James Panicki. |
0:22.3 | Thank you for your company. Now, in a kinder, more loving world, trash talk would have no place |
0:28.7 | in the struggle for market share. Why denigrate your competitor rather than simply singing the |
0:34.2 | praises of your own product? But in this world, the one that we live in, |
0:39.3 | a company disparaging a rival's product or services, is par for the course. Fine, but |
0:45.3 | when does Trash Talk become a competition issue? Nicholas Hurst is a member of our Brussels team. |
0:52.3 | He's too polite to engage in trash talk himself, but he has |
0:56.3 | been covering this issue and will be joining us in just over 10 minutes time. First up, though, |
1:02.4 | to the west coast of the United States in the Capital One trial in which a woman named |
1:07.4 | Paige Thompson has been found guilty of wire fraud and hacking in one of the |
1:12.9 | largest breaches in US history. It's a tricky story. Thompson may not have benefited from |
1:18.9 | the data breach. Nonetheless, she was found guilty under the Computer Fraud and Abuse Act. She'll be |
1:25.6 | sentenced in September. The case has been unfolding in Seattle |
1:29.8 | in Washington State, and our senior correspondent, Amy Miller, has been covering the trial, |
1:35.1 | and she joins me now. So, Amy, first up, just outline the government's case for me. What were |
1:42.1 | the charges? Well, Thompson is a former software engineer with Amazon |
1:46.8 | Web Services. And according to the government, Thompson was trying to engineer a cryptojacking |
1:53.0 | scheme. And she started that out by creating proxy scanners. She knew how all of this worked, |
1:58.8 | because she used to work at AWS. And so she created a scheme to create proxy scanners that identified AWS servers with misconfigured firewalls. |
2:09.6 | Then she used those misconfigured servers to steal security credentials from companies such as Capital One that she would then use to set up a |
2:18.6 | cryptocurrency mining operation. And so along the way of setting up this cryptocurrency mining |
2:24.3 | operation, she downloaded personal information belonging to more than 100 million |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from MLex Market Insight, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of MLex Market Insight and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.