Capital One's $200M Cloud Data Breach

Поділитися
Вставка
  • Опубліковано 5 чер 2024
  • How a random ex-AWS employee managed to get into the AWS account of Capital One unnoticed using a fairly low-skill attack.
    Sources:
    www.justice.gov/media/1019711...
    blog.appsecco.com/an-ssrf-pri...
    krebsonsecurity.com/2019/08/w...
    www.researchgate.net/publicat...\
    www.cnet.com/news/politics/am...
    threatpost.com/capital-one-br...
    Assumptions:
    - 1:35 This is not the actual Github file, we just know there were three commands (see source 1: www.justice.gov/media/1019711.... I added the extra export stuff to illustrate how credentials can be loaded without explaining it directly since that is pretty irrelevant info
    - 7:58 We don't know if the role actually had read permissions for everything (wildcard resource) but let's be honest it probably did.
    Chapters:
    0:00 Day of the Incident
    2:18 The 3 Commands
    4:32 Who's at fault?
    5:21 Capital One's vulnerabilities
    8:14 The hacker's identity
    8:57 Lessons learned
    Music, all from Creator Music:
    - Impact Prelude, Kevin Macleod
    - Switch it Up, Silent Partner
    - Running Errands, TrackTribe
    - Dumb as a Box, Dan Lebowitz
  • Наука та технологія

КОМЕНТАРІ • 397

  • @tinyfluffs
    @tinyfluffs Рік тому +1391

    Also, a fun tale from inside Crapital One. The company decided to yeet their Microsoft software licensing agreement in favour of Google's services plus Zoom, because the execs of Microsoft and Cap1 fell out over a game of golf. Really gives you an insight into the minds of these corporate (b/w)ankers.

    • @TheModdedwarfare3
      @TheModdedwarfare3 Рік тому +168

      Truly we live in a meritocracy.

    • @josh1234567892
      @josh1234567892 Рік тому +37

      Lmao, this is hilarious. Do you remember where you read this?

    • @dendrites
      @dendrites Рік тому +52

      tbf anything is better that the MS Teams ecosystem.

    • @mikhailryzhov9419
      @mikhailryzhov9419 Рік тому +29

      @@dendrites What is Google’s video conference solution today named? It’s not like Teams is any good, but at least they don’t replace it every couple of years since they decided that they killed Skype dead enough.

    • @stringlarson1247
      @stringlarson1247 Рік тому +4

      @@mikhailryzhov9419 Zoom

  • @manzenshaaegis8783
    @manzenshaaegis8783 Рік тому +1127

    The sad part is that you could hardly look beneath the hood at any large or tech company and NOT find this kind of disaster waiting to happen...

    • @BBWahoo
      @BBWahoo Рік тому +23

      Just imagine all the public exploits that have been published without the companies affected being any wiser ✡️

    • @ACCPhil
      @ACCPhil Рік тому +39

      I remember joking in a meeting of my fellow architects (at a company that processes a lot of personal/financial data) "It's a good job the $regulator is so underfunded". The laughter died away pretty quickly as we all looked at each other. Too many people in senior positions will see IT security purely as a cost.

    • @halfstream1461
      @halfstream1461 Рік тому +3

      @Generaal the amount of unsupported servers with minimal backup plans is mind boggling 😂

    • @solmanJapan
      @solmanJapan Рік тому +1

      Some are really good though but they're so good, they're too restrictive and you can't get anything done without going through a million different people and approvals and when things break... Well, good luck trying to troubleshoot where you're being denied.

    • @BitwiseMobile
      @BitwiseMobile Рік тому +10

      Many companies are opening their eyes. My org uses something called the zero trust model paired with least privilege. That means you have to authenticate for everything you do, and if you need to do an administrative task you need to request specific permission in order to do so. Even devops are locked out. The idea is if you do get compromised the damage should be limited to that machine only. We actively scan for PII and PHI on the workstations, and any offender is immediately flagged. We have several layers of access before you even get into our network, and if you do happen to ingress somehow your ability to do damage is severely curtailed. We have put about 20% of our budget into security - hiring top level security engineers with experience with integrated systems (we have data centers too - not everything is in the cloud - and the same escalation is required to access anything on prem). Every single application that goes out into the wild (even if it's an internal application) has to pass a stringent security review where they review things like the access model I discussed previously, how data is transported, how and where it's stored, and other pertinent details around the proposed solution. We actively scan our code base and our web sites for vulnerabilities on a constant basis. We have started to incorporate red/blue teams as well.

  • @jamesmcleod2415
    @jamesmcleod2415 Рік тому +1605

    still just dumbfounded the aws engineer did all of this and didn't even practice basic opsec lmao

    • @maganashaker167
      @maganashaker167 Рік тому +246

      It’s what happens when you get drunk off your achievements and neglect opsec immediately

    • @baosalin6597
      @baosalin6597 Рік тому +170

      @@Cdrsan Apparently the dude was stalking and harrassing former roommates, so not covering all of his bases seemed well within the realm when you're not mentally sound

    • @Handlebrake2
      @Handlebrake2 Рік тому +11

      ​@@asanokatana those aren't severe mental disorders.

    • @Handlebrake2
      @Handlebrake2 Рік тому +5

      @@critamine I don't know what you're talking about.

    • @WideAwakeHuman
      @WideAwakeHuman Рік тому +21

      @@Handlebrake2 gender dysphoria is the most severe and carries a massive increase in suicide risk and a total disconnection from reality

  • @garbagetrash2938
    @garbagetrash2938 Рік тому +110

    "pushing"
    >Puts a picture of deadlift
    "And pulling"
    >Puts a picture of bench
    Someone's a little confused, but they got the spirit!

  • @BurnerWah
    @BurnerWah Рік тому +488

    I'm enjoying these videos a lot, they're informative and have some fun editing lol

    • @Henry-zw4xs
      @Henry-zw4xs Рік тому +1

      How do you listen to this AI voice it just sounds odd

    • @OfficialTM876
      @OfficialTM876 Рік тому +3

      @@Henry-zw4xs is it the tone or speed? I put it on 1.25x 😅

    • @technophobian2962
      @technophobian2962 4 місяці тому +1

      ​@@Henry-zw4xsThe voice is perfect for the style of commentary and editing imo.

    • @ENCHANTMEN_
      @ENCHANTMEN_ 22 дні тому +1

      Dumb little visualizations like that are fantastic for actually getting the point across. Computer infrastructure terminology gets super abstract sometimes

  • @nachoIibre
    @nachoIibre Рік тому +204

    Unless some material facts are missing from this video, if I was auditing this, I'd put the blame entirely on Capital One. That is not a reverse proxy. It looks like a simple HTTP proxy, and a blind, fully trusting one at that. I don't think a network TTL of 1 would've protected them. The incoming TCP request would've terminated at the proxy, and it would've been a new connection between the compromised server and the metadata server. The change to PUT would've probably worked, but developers that make "convenience choices" like creating this proxy, also do stupid things like "damn AWS doesn't let me GET, imma proxy it to PUT".
    Like I said, unless something huge is missing, it's entirely Capital One's fault. But they're a huge customer, AWS would make changes to allow customers that size to make stupid mistakes and still mitigate the loss. Azure is HUNGRY. I was only running an account with a couple of mill worth annual usage a few years ago and Azure sales guys were calling me to meet every couple of months.

    • @nachoIibre
      @nachoIibre Рік тому +30

      @@asanokatana AWS did actually make a couple of changes on the back of the Capital One incident. Some of it was discussed in the video.

    • @marcellkovacs5452
      @marcellkovacs5452 4 місяці тому +5

      @@nachoIibrethey made (pretty simple) changes because it’s bad PR even if it’s not their fault

  • @JoeChang1999
    @JoeChang1999 Рік тому +86

    Wow, I worked at C1 as a swe intern few months after the attack, but the company wouldn’t tell us what really happened to this level. Thanks for the info!

  • @ewvcweddfg
    @ewvcweddfg Рік тому +49

    your channel is criminaly underrated

    • @piyh3962
      @piyh3962 Рік тому +3

      I work at the company and this video explained why C1 has so many controls I've had to deal with in my day to day job.

  • @aperture147
    @aperture147 Рік тому +153

    All the features in AWS are pretty well documented, they even explain how things works inside so you can understand the tools better. One of the biggest drawback of AWS is the lacking of advanced examples. They just provided the most simple example, so you may have a hard time to figure out what do they actually do, especially cloudformation and python aws sdk. They are well documented but painfully abstracted so you have to try and retry again and again to make something work as intended. It’s like they give you a death star lego set of 100000 lego pieces, with just a few pages to build some simple construction so you have to look at the images in the box to build the complete one.

    • @drakedoss1975
      @drakedoss1975 Рік тому +9

      Fair point. Then again almost no SDK, let alone any language contains advanced examples. Think about the Stream/Collection Javadocs and how often those two can be used together, but Oracle chose to give you only a holistic picture of what’s possible. There’s only so much to teach before you have to apply it yourself.

    • @nemesisprime6727
      @nemesisprime6727 11 місяців тому

      The thing is AWS being dominant became ignorant between 2016-2021. I work on multi cloud setup and AWS is the one that I am least interested to work with.

    • @aperture147
      @aperture147 11 місяців тому +2

      @@nemesisprime6727they are the most popular. You know, popular does not mean the best, like js and mongodb, very popular but scaling them is a true nightmare

    • @joshurlay
      @joshurlay 10 місяців тому

      This was very well put.

    • @aperture147
      @aperture147 9 місяців тому

      @@drakedoss1975 ah yes, Stream API and Collection framework, classic security risk mine.

  • @genericmainer
    @genericmainer Рік тому +193

    Just finished a binge of a ton of your videos. Keep up the grind my brother and you will 100% have a thriving career as a youtube creator. These videos are clearly really high effort and also just good (those things arent necessarily correlated).

  • @stringlarson1247
    @stringlarson1247 Рік тому +11

    I worked a contract there as a Sr. SW Engineer. Was never told I was put on a team/project for which I interviewed. Was supposed to be doing design/implementation of some new micro services. I start day one and the project manager didn't know I was coming on board and we had never spoken. I spend the day getting my env set up blah blah blah. Then they started pulling tasks off of the 'Agile' board and point me to the code base and it's a complete clusterfk of code that was about 2 yrs old and nobody was around who understood the problem domain. absolutely no discipline (SOLID, DRY, etc) was used. Thousands of lines of 'copy pasta'. Automated tests (Cuke or whatever?) that didn't pass simply had the input data commented out. AND, best of all, I'm told that the team is responsible for setting up AWS S3 and servers, networking, etc. No dedicated DevOps people. I don't do that stuff and when I've done it in the past, only in a 'dev' env. and not in 'prod'.
    Two other TBTF banks were bad as well, but nothing like CapOne. Un-real.

  • @krazypeople4
    @krazypeople4 Рік тому +25

    No one was hacked, that information was public, or rather the security keys to access the private information was publicly available.

    • @fltfathin
      @fltfathin 10 місяців тому +5

      It is literally dropping door pasword note on the floor in front of the door

  • @_Jayonics
    @_Jayonics Рік тому +248

    I love how the gist literally said: "Warning: use of these commands will get you arrested by the FBI, user discretion is advised" 😂
    And there was me thinking it was a rookie mistake making such a script public...

    • @Y2B123
      @Y2B123 Рік тому +38

      I think it would have been quite clever to share the script had he used a more discreet account. A bunch of people downloading the data through Tor could create a lot of work for the investigators and thus help hide his identity.

    • @chainswordcs
      @chainswordcs Рік тому +43

      the description says "This is not the actual Github file"

    • @solmanJapan
      @solmanJapan Рік тому

      Someone honestly should go through AWS (and other providers) list of IP addresses and attempt to get the instance ID. If you can, report it to the cloud provider so hopefully they can inform the customers that are affected.

    • @danielo7985
      @danielo7985 Рік тому +1

      @@Y2B123 They'll just look @ the 1st ip

    • @Bomkz
      @Bomkz Рік тому +4

      @@danielo7985 would've worked if it weren't for the fact that the attacker used Tor.

  • @or.o.s.t8190
    @or.o.s.t8190 Рік тому +89

    Bro your channel should be going places. I found it through your Cloudflare vid (of course) which currently has 1M views and idk how more people aren't subscribed. Really top notch content!

  • @oldmanbanjo
    @oldmanbanjo Рік тому +32

    This channel kicks butt. You're going to go places dude if you keep up with this content.

  • @ghostmedic171TV
    @ghostmedic171TV 10 місяців тому +12

    Just wanted to say - you do a great job breaking these events down and producing them - I hope you get time to make more - I find the malicious ones the most interesting, but even fail over fails are fascinating (probably most of us working on the periphery of the IT sector do too)

  • @ergsegweargfsadf
    @ergsegweargfsadf Рік тому +5

    the minecraft cli XDDDD man your editing is the best and story telling is top notch.

  • @joachimbulow
    @joachimbulow Рік тому +7

    Keep posting, Kevin! These videos are awesome - I will be recommending to people

  • @mipmipmipmipmip
    @mipmipmipmipmip Рік тому +22

    The cloud has been a paradigm shift: an enterprise's technical debt can now finally be abused at scale!

  • @mudi2000a
    @mudi2000a Рік тому +57

    Claiming AWS is responsible is kind of ridiculous. Of course it could be done better and they DID improve it. Only because engineers are lazy and give too many permissions. I’ve seen it myself of course but I think it is lack of good practice or maybe outsourcing ,, and people just try to get something working by throwing more and more permissions at it instead of the
    more time consuming process to look for the root cause and do it properly.

    • @aperture147
      @aperture147 Рік тому +6

      AWS somewhat created a vulnerable point in their system, which could be avoided. It’s like a mom store the tide pods with candy packs, telling her children that tide pods is not edible. Somehow one day the child ate the pods instead of candies and go straight to the coffin. Yeah we can easily blame the child to be not careful enough, but the mom could have prevented that in the first place if she put the tide pods in a safer place. That’s why in everybox of liquid detergent said “keep away from children”. So AWS partly have some responsibilities in this case.

    • @thewhitefalcon8539
      @thewhitefalcon8539 9 місяців тому +1

      @@aperture147 It's like the grocery store has both tide pods and candy packs in the store and you're blaming it for having them both in the store instead of making people go to a separate store to get tide pods.

  • @Ashinle
    @Ashinle Рік тому +3

    Your videos just have a flow and dry humour to them that makes it very entertaining to watch while still being informative and not being demeaning

  • @liquid_shadow8690
    @liquid_shadow8690 Рік тому +41

    Couple of years ago my account was hacked. Fraudulent charges notifications so i called Capital one. They shut down my card but the fraudulent charges were still happening as i they shut down the card. They had the nerve to ask me if i gave my card to someone and I’m like, “you dumbasses, you just shut down my card so how are the charges happening as we speak?”

  • @redandblue1013
    @redandblue1013 11 місяців тому +1

    Just want to say your channel is amazing and I’m so glad I found it before it blew up

  • @hemerythrin
    @hemerythrin Рік тому +7

    Love the editing in these postmortem videos!

  • @Lambda.Function
    @Lambda.Function Рік тому +214

    The real question is how the guy got away with it. That's a pretty textbook CFAA violation. I kinda died a little the second I saw that IMDS forwarded URL, anyone who's dealt with this before knew immediately what happened.

    • @ramielsayed2614
      @ramielsayed2614 Рік тому +10

      @@raylopez99 well that's really fair

    • @f4ephilosophy691
      @f4ephilosophy691 Рік тому +40

      @@ramielsayed2614 Actually gamed the system.

    • @raylopez99
      @raylopez99 Рік тому +1

      @@f4ephilosophy691 would not surprise me if the dude squirreled away some money offshore and then pretended to have spent it all...

    • @TheShamefurDispray
      @TheShamefurDispray Рік тому +25

      @@raylopez99 Oh it was someone even more institutionally privileged than a woman. Thanks for letting us know.

    • @BBWahoo
      @BBWahoo Рік тому

      @@TheShamefurDispray
      That's why 10:40 happened I suppose, girls looking out for each other 🤣🤙

  • @1UTUBEUSERNAME
    @1UTUBEUSERNAME Рік тому +9

    Worked for a client that did work for Capitol One, prior to 2019. Capitol One was by far the most strict partner that we dealt with. Everyone complained about having to follow Cap One's processes and procedures but what we realized that it was for our own good.

  • @MRJMXHD
    @MRJMXHD 9 місяців тому

    Man, your way of explaining stuff is brilliant and easy to understand, even for a lay person. You deserve way more subs!!

  • @HaidarHavana1998
    @HaidarHavana1998 Рік тому +3

    Fun and educative video. Hope your channel blows up

  • @123gostly
    @123gostly Рік тому +2

    Adding a comment to help engagement. This is a truly underrated channel.

  • @user-kr2ls5ju6e
    @user-kr2ls5ju6e 11 місяців тому +7

    Dude this is one of the most informative yet hilarious channels I've come across related to cybersecurity. Awesome job. Love the in depth details of actually went wrong instead of just broad "got hacked" verbiage.

  • @Basu770
    @Basu770 Рік тому

    Great video! i've been looking for more channels like this! Subscribed!

  • @MultiMojo
    @MultiMojo Рік тому +62

    IAMs, VPCs and SGs are the most confusing part of AWS services. It's a labyrinth of configurations and very easy to screw up.

    • @aperture147
      @aperture147 Рік тому +4

      All the features in AWS are pretty well documented, they even explain how things works inside so you can understand the tools better. One of the biggest drawback of AWS is the lacking of advanced examples. They just provided the most simple example, so you may have a hard time to figure out what do they actually do, especially cloudformation and python aws sdk. They are well documented but painfully abstracted so you have to try and retry again and again to make something work as intended. It’s like they give you a death star lego set of 100000 lego pieces, with just a few pages to build some simple construction so you have to look at the images in the box to build the complete one.

    • @MoiledSpilk
      @MoiledSpilk Рік тому

      completely disagree

    • @lucassartor5485
      @lucassartor5485 Рік тому

      @@aperture147 agree 100%

  • @Hugos68
    @Hugos68 Рік тому +1

    I love these videos, please keep making more

  • @guillaume5623
    @guillaume5623 Рік тому +3

    This is gold ! Thank you

  • @Chipotle14
    @Chipotle14 Рік тому +1

    Lmaooo I love the Lavish Tesla pic for "automatic braking". Excellent, subbed.

  • @MrJonathandsouza
    @MrJonathandsouza Рік тому +2

    This is great content, Keep up the good work

  • @fleshinterface
    @fleshinterface Рік тому +2

    their arch nemesis: the on-premises menace
    I love this channel

  • @picklypt
    @picklypt Рік тому +2

    Very good video. Love this type of story telling

  • @greenerell484
    @greenerell484 3 місяці тому +1

    you can't even really be mad at the hacker for exploiting such a trivial weakness

  • @HolyOllie
    @HolyOllie Рік тому +9

    Ooo! Another video 😊

  • @mattmcmahon4240
    @mattmcmahon4240 Рік тому +3

    As someone who knows cap1 senior devs I’m not surprised this video came out. Only it didn’t come out sooner.

  • @h8f8
    @h8f8 Рік тому +2

    Thank you for the great content to consume while snacking, from the editing to the info, good stuff :)

  • @gblargg
    @gblargg Рік тому +1

    I love all the explosions in your videos.

  • @aln447
    @aln447 Рік тому

    Love the content man! You've just earned a sub

  • @michaelashby9654
    @michaelashby9654 Рік тому +25

    AWS should have two types of S3 buckets (public immutable, and private immutable). And that would solve a lot of problems.
    What I see happen is devs get confused by all the security configurations for S3. This isn't an excuse but I'm just saying what I see happen. The problem is that a private bucket can be changed to public.

    • @halfstream1461
      @halfstream1461 Рік тому +9

      The amount of documentation you need to read to get the right permissions are just ridiculous if you don’t know what your doing. And most of devs who set this up aren’t experts in cybersecurity so it’s hard. That’s why pen testing is so damn important, even if it’s bloody expensive.

    • @ladyarmourlapras
      @ladyarmourlapras Рік тому +8

      the process to unprivate a bucket is lengthy in itself. you need to uncheck/deselect/disable varying options across their submenus. all buckets are locked down by default with plenty of warnings screaming if something is public. company needs to also do their due diligence and actually prevent + detect anything thats been exposed to the internet.

    • @manapause
      @manapause Рік тому +1

      That’s not what happened here though 😊 but it has been the source of many leaks before

    • @jimmyprior
      @jimmyprior Рік тому +3

      S3 buckets are private by default for good reason. I really can’t see many good reasons to make a bucket public. Part of the billing is data transfer so allowing anyone to consume as much content in a bucket as often as they please is going to result in hefty bills.

  • @haxguy0
    @haxguy0 Рік тому

    Wow, what an amazing video. Thank you

  • @bummbumm6
    @bummbumm6 Рік тому

    PLEASE MAKE MORE VIDEOS THIS IS AMAZING

  • @gabriellindgren5079
    @gabriellindgren5079 Рік тому +1

    Very interesting video, thank you!

  • @Lochyj0001
    @Lochyj0001 Рік тому +3

    Underrated channel

  • @urbantiles
    @urbantiles Рік тому +1

    I love your videos!

  • @BitwiseMobile
    @BitwiseMobile Рік тому +23

    I was interviewed several times by Captial One about 5 years ago. I was a certified solution architect and I had put in my resume at some point. They were really trying to poach me, but three minutes into the interview I knew it was a clown college. Regarding AWS security - they are only responsible for data inside their network. They tell you this, and it's part of the practitioner and solution provider exams. If you are 100% serverless then AWS is 100% responsible for your data. As soon as you agree to manage your own server via an EC2 instance then you are responsible. Honestly I don't know why any org would need an EC2 instance when ECS is a viable alternative, and makes scaling zero effort. Scaling EC2 instances can be done, but it takes work, and it's susceptible to all the problems a non-managed solution has.

    • @zeytelaloi
      @zeytelaloi Рік тому +1

      They probably just did a lift-n-shift from on-prem, before they had containerized their setup.

    • @jk2l
      @jk2l 11 місяців тому +2

      that's not how shared responsibility work... AWS responsible for the underneath infrastructure. so it is true if it is serverless AWS responsible the server that run the software. but the IAM permission, the code you run inside serverless is still responsible by the user who create it

  • @nicholasvinen
    @nicholasvinen Рік тому +45

    Having a wide open reverse proxy on your corporate network seems like a terrible idea.

  • @XabGaming
    @XabGaming Рік тому +1

    i love this video keep makingmore of it

  • @lintycarcass
    @lintycarcass Рік тому +1

    Editing is really good.

  • @timvw01
    @timvw01 Рік тому

    This is a great channel

  • @egekaangurkan9481
    @egekaangurkan9481 Рік тому

    This is my new fave channel

  • @brys6577
    @brys6577 Рік тому +13

    Capital one should probably incentivize giving people rewards for following their responsible disclosure agreement.

    • @IdgaradLyracant
      @IdgaradLyracant Рік тому

      No. The problem is you'll get a pair of enterprising folks that will create trivial problems, then report them to get rewarded. Then someone will make a flaw they think is trivial, but turns out to be serious, and by the time it is corrected things go to hell very fast.

    • @interesting9688
      @interesting9688 4 місяці тому

      They should; it would incentivize people more, but the FBI and others will pay millions to get some of these exploits; there's no competition if people do it for the money.

  • @phitc4242
    @phitc4242 Рік тому +1

    I got an AWS ad on this video

  • @LFOD1776
    @LFOD1776 Рік тому +1

    I have no idea what the hell that video was about.
    You engineers make civilized life possible and don’t get an iota of appreciation from the rest of us.

  • @aidantilgner
    @aidantilgner Рік тому

    Amazing quality man

  • @kacper9081
    @kacper9081 Рік тому +1

    this channel will blow up soon

  • @YoanGonzalez-yr2rf
    @YoanGonzalez-yr2rf 10 місяців тому

    Love your slides lol

  • @JB-fh1bb
    @JB-fh1bb Рік тому +3

    8:07 it lived up to the WAF part of it’s namesake 😂😂😂

  • @MorpH2k
    @MorpH2k 4 місяці тому +2

    The name of the VPN service "Ipredator" is.. one could call it "unfortunate", but it's probably deliberate. The service was created in direct response to the EU IPR directive, also known as IPRED, and the subsequent Swedish Intellectual Property law commonly known as the IRPED-law, which was basically about combating software piracy in general and, some would say, specifically made to attack The Pirate Bay.

  • @allezvenga7617
    @allezvenga7617 Рік тому

    Thanks for your sharing

  • @Samuftie
    @Samuftie 11 місяців тому

    great video, thank you.

  • @kartik4792
    @kartik4792 Рік тому

    Amazing! Instant subscribe + all notifications

  • @maxzak5310
    @maxzak5310 Рік тому

    underrated channel

  • @solmanJapan
    @solmanJapan Рік тому +11

    What a fantastic video. Just goes to show that we need to be mindful of the security of our operating systems and applications.

  • @justingolden21
    @justingolden21 Рік тому +5

    I say capital one's fault. They're using the service and AWS is only responsible for accurately telling them what they get and don't get. If Amazon guarantees something or misconstrues what they provide or fails to provide, it's their fault, else it's not. If Amazon says they get 99% uptime and they get 99% uptime, it's on the customer. That being said, sticky situation and one could make a case for either. I like the braking analogy as it's definitely a spectrum for what's "expected"/"reasonable" for example automatic advanced braking system vs just a working one in general. The difference is just the scale and what's "reasonably expected"

  • @FlabbyTabby
    @FlabbyTabby 11 місяців тому

    Please make more of these videos! They're great.

  • @1337ASM
    @1337ASM 10 місяців тому

    Great video❤

  • @ai-spacedestructor
    @ai-spacedestructor Рік тому +2

    imagine legitimately using bing and actually expecting a quality response.

  • @Controllerhead
    @Controllerhead Рік тому +2

    Capital One: Who's In Your Wallet?

  • @FSimon766
    @FSimon766 Рік тому

    Im new here. Nice vid, subbed!

  • @johnstoia8153
    @johnstoia8153 Рік тому +1

    Well made video 👍🏻

  • @trevise684
    @trevise684 Рік тому +4

    amazing

  • @MuscleTeamOfficial
    @MuscleTeamOfficial Рік тому

    this video was done well thx

  • @David-bh7hs
    @David-bh7hs Рік тому +7

    Like disruptTV without the distractions, just the info

  • @clayc9221
    @clayc9221 Рік тому +1

    it was in the cloud, they should’ve known it would’ve rained down one day

  • @synack_
    @synack_ Рік тому

    Great overview, thank you. Please do tone back the volume on the effects you use though, sometimes they drown out what you’re saying.

  • @kisaragi-hiu
    @kisaragi-hiu Рік тому +2

    2:41 that's legit how I learned how CLIs work lol

  • @TheGamingInkling
    @TheGamingInkling 8 місяців тому

    Alright just one more video before I go to sleep
    The last video before I sleep:

  • @greg-bc8ky
    @greg-bc8ky 11 місяців тому

    I literally just started working on their Cloud Security team and this is the first time I'm hearing of this smh

  • @rynn_3988
    @rynn_3988 Рік тому

    How tf did I found your channel just today?? Where have you been?

  • @Some1Casual
    @Some1Casual Рік тому +2

    Simple Storage Service... no security concerns here, it is just a "simple" service going on...
    Looking back at some of these leaks that involved S3 and AWS where companies "rushed" into selling the cloud idea to their senior leadership, seems like people had their own set goals to get the biggest bonus possible, and sell fancy terminology how company is modernizing, how company is adopting intelligent technology, etc. - but behind all that "fancy" is simply the same technology that was available before - just now, you pay the company to host it for you instead of building your own data center... hence, since you are "contracting out" that piece, it is inevitable that once again convenience comes at the price of security... So how does this happen? It happens when AWS tells the company this service comes with the shared responsibility - AWS is responsible for a piece of it, while the company handles a piece of it... in other words, unlikely that AWS will do something wrong, as they are in business in providing this up to a certain level and you get the whole encyclopedia of it what they do... companies??? Apparently not so much in CapitalOne case...
    Too bad that data breaches continue to happen, and penalties and fines companies end up with are nowhere near realistic ones to make a difference... "it's a speeding ticket" given their profits that measure in billions each quarter...

  • @shubhamsawant1551
    @shubhamsawant1551 3 місяці тому +1

    Some thing amaze mee is that who uploaded cred file to git repo and who made git repo public is operational team forgetting the severity of information

  • @asdfg3421
    @asdfg3421 Рік тому

    I love this.

  • @Shaojeemy
    @Shaojeemy Рік тому +2

    Money under the mattress is looking better and better

  • @freem4nn129
    @freem4nn129 Рік тому

    hahaha the on premises menace :D good one

  • @1.4142
    @1.4142 Рік тому

    So underrated

  • @aintaintaword666
    @aintaintaword666 Рік тому

    9:37 "google en pasent" - I see you are a man of culture!

  • @abbynormal1965
    @abbynormal1965 Рік тому +6

    In my 35 years as an IT tech, I have come to the conclusion, If a system can be written, it is a system that can be hacked.

    • @17hanke26
      @17hanke26 Рік тому +7

      The changes you've seen In your tech career must be astronomical!

  • @aaronl19
    @aaronl19 10 місяців тому +1

    9:33 holly he’ll!

  • @Derekzparty
    @Derekzparty 11 місяців тому

    In your base, taking your stuff

  • @iisky1
    @iisky1 Рік тому

    To crazy with the editing

  • @SIMULATAN
    @SIMULATAN Рік тому

    Yaay! More explosions 🔥💥💣

  • @1retrothomas437
    @1retrothomas437 Рік тому

    great video, funny as well lol

  • @carn941
    @carn941 Рік тому +1

    Why do you not have a million subs?!

  • @samcarsonx
    @samcarsonx Рік тому +1

    So what happened to the person who published it on GitHub?