Wednesday, December 6, 2023

Capital One Hacked – Over 100 Million Credit Card Application Data Exposed

Capital one hacked, the hack exposed more than 100 million customers data across the US and Canada. The breach was learned by Capital One Financial Corporation on July 19, 2019.

Following are the personal information affected with the breach that includes names, addresses, zip codes/postal codes, phone numbers, email addresses, dates of birth, credit scores, credit limits, balances, payment history, contact information, and self-reported income.

The leaked data includes 140,000 Social Security numbers and 80,000 linked bank account numbers, according to the company statement “no credit card account numbers or log-in credentials were compromised and over 99 percent of Social Security numbers were not compromised.”

Unauthorized Access

Capital One reads the unauthorized access first on July 19, 2019, “unauthorized access by an outside individual who obtained certain types of personal information” of customers who applied for credit cards Capital One.

The affected data also includes fragments of transaction data “from a total of 23 days during 2016, 2017 and 2018”, the company expects this hack could cost “approximately $100 to $150 million in 2019″.”

“While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened,” said Richard D. Fairbank, Chairman, and CEO. “I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right.”

The major part of the leaked information includes information on consumers and small businesses as who applied for credit cards between 2005 through early 2019.

Capital One Hacked – Tech Worker Arrested

As soon they aware of the intrusion they immediately fixed the vulnerability and started working with FBI, the FBI has arrested the tech worker associated with the breach.

According to court records, a woman Paige A. Thompson a/k/a erratic, 33, posted on GitHub about her theft of information form Capital One server, the intrusion occurs because of a misconfigured web application firewall that enabled data access. She is detained and pending for hearing on August 1, 2019.

“Capital One quickly alerted law enforcement to the data theft — allowing the FBI to trace the intrusion,” said U.S. Attorney Moran. “I commend our law enforcement partners who are doing all they can to determine the status of the data and secure it.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.


Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles