Capital One's $200M Cloud Data Breach

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 378

  • @manzenshaaegis8783
    @manzenshaaegis8783 Год назад +1239

    The sad part is that you could hardly look beneath the hood at any large or tech company and NOT find this kind of disaster waiting to happen...

    • @BBWahoo
      @BBWahoo Год назад +26

      Just imagine all the public exploits that have been published without the companies affected being any wiser ✡️

    • @ACCPhil
      @ACCPhil Год назад +45

      I remember joking in a meeting of my fellow architects (at a company that processes a lot of personal/financial data) "It's a good job the $regulator is so underfunded". The laughter died away pretty quickly as we all looked at each other. Too many people in senior positions will see IT security purely as a cost.

    • @halfstream1461
      @halfstream1461 Год назад +4

      @Generaal the amount of unsupported servers with minimal backup plans is mind boggling 😂

    • @OneIdeaTooMany
      @OneIdeaTooMany Год назад +2

      Some are really good though but they're so good, they're too restrictive and you can't get anything done without going through a million different people and approvals and when things break... Well, good luck trying to troubleshoot where you're being denied.

    • @BitwiseMobile
      @BitwiseMobile Год назад +11

      Many companies are opening their eyes. My org uses something called the zero trust model paired with least privilege. That means you have to authenticate for everything you do, and if you need to do an administrative task you need to request specific permission in order to do so. Even devops are locked out. The idea is if you do get compromised the damage should be limited to that machine only. We actively scan for PII and PHI on the workstations, and any offender is immediately flagged. We have several layers of access before you even get into our network, and if you do happen to ingress somehow your ability to do damage is severely curtailed. We have put about 20% of our budget into security - hiring top level security engineers with experience with integrated systems (we have data centers too - not everything is in the cloud - and the same escalation is required to access anything on prem). Every single application that goes out into the wild (even if it's an internal application) has to pass a stringent security review where they review things like the access model I discussed previously, how data is transported, how and where it's stored, and other pertinent details around the proposed solution. We actively scan our code base and our web sites for vulnerabilities on a constant basis. We have started to incorporate red/blue teams as well.

  • @ellafoxoo
    @ellafoxoo Год назад +1564

    Also, a fun tale from inside Crapital One. The company decided to yeet their Microsoft software licensing agreement in favour of Google's services plus Zoom, because the execs of Microsoft and Cap1 fell out over a game of golf. Really gives you an insight into the minds of these corporate (b/w)ankers.

    • @TheModdedwarfare3
      @TheModdedwarfare3 Год назад +190

      Truly we live in a meritocracy.

    • @josh1234567892
      @josh1234567892 Год назад +43

      Lmao, this is hilarious. Do you remember where you read this?

    • @langmod
      @langmod Год назад +63

      tbf anything is better that the MS Teams ecosystem.

    • @mikhailryzhov9419
      @mikhailryzhov9419 Год назад +36

      @@langmod What is Google’s video conference solution today named? It’s not like Teams is any good, but at least they don’t replace it every couple of years since they decided that they killed Skype dead enough.

    • @stringlarson1247
      @stringlarson1247 Год назад +5

      @@mikhailryzhov9419 Zoom

  • @maroxesen1
    @maroxesen1 6 месяцев назад +45

    Yes, we leaked your Social Security Number. Yes, we paid less than 2$ per SSN leaked. No, the $2 doesn't go to you, it goes to the state.

  • @garbagetrash2938
    @garbagetrash2938 Год назад +192

    "pushing"
    >Puts a picture of deadlift
    "And pulling"
    >Puts a picture of bench
    Someone's a little confused, but they got the spirit!

    • @thilsiktonix
      @thilsiktonix 3 месяца назад

      2:35 I saw this at the same time that part started playing lmao

  • @nachoIibre
    @nachoIibre Год назад +243

    Unless some material facts are missing from this video, if I was auditing this, I'd put the blame entirely on Capital One. That is not a reverse proxy. It looks like a simple HTTP proxy, and a blind, fully trusting one at that. I don't think a network TTL of 1 would've protected them. The incoming TCP request would've terminated at the proxy, and it would've been a new connection between the compromised server and the metadata server. The change to PUT would've probably worked, but developers that make "convenience choices" like creating this proxy, also do stupid things like "damn AWS doesn't let me GET, imma proxy it to PUT".
    Like I said, unless something huge is missing, it's entirely Capital One's fault. But they're a huge customer, AWS would make changes to allow customers that size to make stupid mistakes and still mitigate the loss. Azure is HUNGRY. I was only running an account with a couple of mill worth annual usage a few years ago and Azure sales guys were calling me to meet every couple of months.

    • @nachoIibre
      @nachoIibre Год назад +33

      @@asanokatana AWS did actually make a couple of changes on the back of the Capital One incident. Some of it was discussed in the video.

    • @marcellkovacs5452
      @marcellkovacs5452 10 месяцев назад +9

      @@nachoIibrethey made (pretty simple) changes because it’s bad PR even if it’s not their fault

  • @BurnerWah
    @BurnerWah Год назад +519

    I'm enjoying these videos a lot, they're informative and have some fun editing lol

    • @Henry-zw4xs
      @Henry-zw4xs Год назад +1

      How do you listen to this AI voice it just sounds odd

    • @OfficialTM876
      @OfficialTM876 Год назад +4

      @@Henry-zw4xs is it the tone or speed? I put it on 1.25x 😅

    • @technophobian2962
      @technophobian2962 9 месяцев назад +3

      ​@@Henry-zw4xsThe voice is perfect for the style of commentary and editing imo.

    • @ENCHANTMEN_
      @ENCHANTMEN_ 6 месяцев назад +1

      Dumb little visualizations like that are fantastic for actually getting the point across. Computer infrastructure terminology gets super abstract sometimes

    • @MCAlexisYT
      @MCAlexisYT 4 месяца назад

      @@ENCHANTMEN_ And it sometimes feels like trying to pull meaning out of a bunch of colored rectangles spilled all over a sheet of paper that got framed in a museum.

  • @JoeChang1999
    @JoeChang1999 Год назад +103

    Wow, I worked at C1 as a swe intern few months after the attack, but the company wouldn’t tell us what really happened to this level. Thanks for the info!

  • @aperture147
    @aperture147 Год назад +165

    All the features in AWS are pretty well documented, they even explain how things works inside so you can understand the tools better. One of the biggest drawback of AWS is the lacking of advanced examples. They just provided the most simple example, so you may have a hard time to figure out what do they actually do, especially cloudformation and python aws sdk. They are well documented but painfully abstracted so you have to try and retry again and again to make something work as intended. It’s like they give you a death star lego set of 100000 lego pieces, with just a few pages to build some simple construction so you have to look at the images in the box to build the complete one.

    • @drakedoss1975
      @drakedoss1975 Год назад +10

      Fair point. Then again almost no SDK, let alone any language contains advanced examples. Think about the Stream/Collection Javadocs and how often those two can be used together, but Oracle chose to give you only a holistic picture of what’s possible. There’s only so much to teach before you have to apply it yourself.

    • @nemesisprime6727
      @nemesisprime6727 Год назад

      The thing is AWS being dominant became ignorant between 2016-2021. I work on multi cloud setup and AWS is the one that I am least interested to work with.

    • @aperture147
      @aperture147 Год назад +2

      @@nemesisprime6727they are the most popular. You know, popular does not mean the best, like js and mongodb, very popular but scaling them is a true nightmare

    • @joshurlay
      @joshurlay Год назад

      This was very well put.

    • @aperture147
      @aperture147 Год назад

      @@drakedoss1975 ah yes, Stream API and Collection framework, classic security risk mine.

  • @ewvcweddfg
    @ewvcweddfg Год назад +58

    your channel is criminaly underrated

    • @piyh3962
      @piyh3962 Год назад +3

      I work at the company and this video explained why C1 has so many controls I've had to deal with in my day to day job.

  • @genericmainer
    @genericmainer Год назад +201

    Just finished a binge of a ton of your videos. Keep up the grind my brother and you will 100% have a thriving career as a youtube creator. These videos are clearly really high effort and also just good (those things arent necessarily correlated).

    • @underTheStorm
      @underTheStorm Год назад

      How to find videos similar to these?

  • @or.o.s.t8190
    @or.o.s.t8190 Год назад +91

    Bro your channel should be going places. I found it through your Cloudflare vid (of course) which currently has 1M views and idk how more people aren't subscribed. Really top notch content!

  • @liquid_shadow8690
    @liquid_shadow8690 Год назад +57

    Couple of years ago my account was hacked. Fraudulent charges notifications so i called Capital one. They shut down my card but the fraudulent charges were still happening as i they shut down the card. They had the nerve to ask me if i gave my card to someone and I’m like, “you dumbasses, you just shut down my card so how are the charges happening as we speak?”

  • @ghostmedic171TV
    @ghostmedic171TV Год назад +13

    Just wanted to say - you do a great job breaking these events down and producing them - I hope you get time to make more - I find the malicious ones the most interesting, but even fail over fails are fascinating (probably most of us working on the periphery of the IT sector do too)

  • @oldmanbanjo
    @oldmanbanjo Год назад +33

    This channel kicks butt. You're going to go places dude if you keep up with this content.

  • @mudi2000a
    @mudi2000a Год назад +62

    Claiming AWS is responsible is kind of ridiculous. Of course it could be done better and they DID improve it. Only because engineers are lazy and give too many permissions. I’ve seen it myself of course but I think it is lack of good practice or maybe outsourcing ,, and people just try to get something working by throwing more and more permissions at it instead of the
    more time consuming process to look for the root cause and do it properly.

    • @aperture147
      @aperture147 Год назад +6

      AWS somewhat created a vulnerable point in their system, which could be avoided. It’s like a mom store the tide pods with candy packs, telling her children that tide pods is not edible. Somehow one day the child ate the pods instead of candies and go straight to the coffin. Yeah we can easily blame the child to be not careful enough, but the mom could have prevented that in the first place if she put the tide pods in a safer place. That’s why in everybox of liquid detergent said “keep away from children”. So AWS partly have some responsibilities in this case.

    • @thewhitefalcon8539
      @thewhitefalcon8539 Год назад +2

      @@aperture147 It's like the grocery store has both tide pods and candy packs in the store and you're blaming it for having them both in the store instead of making people go to a separate store to get tide pods.

  • @MultiMojo
    @MultiMojo Год назад +62

    IAMs, VPCs and SGs are the most confusing part of AWS services. It's a labyrinth of configurations and very easy to screw up.

    • @aperture147
      @aperture147 Год назад +4

      All the features in AWS are pretty well documented, they even explain how things works inside so you can understand the tools better. One of the biggest drawback of AWS is the lacking of advanced examples. They just provided the most simple example, so you may have a hard time to figure out what do they actually do, especially cloudformation and python aws sdk. They are well documented but painfully abstracted so you have to try and retry again and again to make something work as intended. It’s like they give you a death star lego set of 100000 lego pieces, with just a few pages to build some simple construction so you have to look at the images in the box to build the complete one.

    • @MoiledSpilk
      @MoiledSpilk Год назад

      completely disagree

    • @lucassartor5485
      @lucassartor5485 Год назад

      @@aperture147 agree 100%

  • @MarkMaloney-k8k
    @MarkMaloney-k8k Год назад +8

    Dude this is one of the most informative yet hilarious channels I've come across related to cybersecurity. Awesome job. Love the in depth details of actually went wrong instead of just broad "got hacked" verbiage.

  • @krazypeople4
    @krazypeople4 Год назад +37

    No one was hacked, that information was public, or rather the security keys to access the private information was publicly available.

    • @fltfathin
      @fltfathin Год назад +13

      It is literally dropping door pasword note on the floor in front of the door

    • @Apple_Beshy
      @Apple_Beshy 5 месяцев назад

      😂

  • @1UTUBEUSERNAME
    @1UTUBEUSERNAME Год назад +11

    Worked for a client that did work for Capitol One, prior to 2019. Capitol One was by far the most strict partner that we dealt with. Everyone complained about having to follow Cap One's processes and procedures but what we realized that it was for our own good.

  • @stringlarson1247
    @stringlarson1247 Год назад +14

    I worked a contract there as a Sr. SW Engineer. Was never told I was put on a team/project for which I interviewed. Was supposed to be doing design/implementation of some new micro services. I start day one and the project manager didn't know I was coming on board and we had never spoken. I spend the day getting my env set up blah blah blah. Then they started pulling tasks off of the 'Agile' board and point me to the code base and it's a complete clusterfk of code that was about 2 yrs old and nobody was around who understood the problem domain. absolutely no discipline (SOLID, DRY, etc) was used. Thousands of lines of 'copy pasta'. Automated tests (Cuke or whatever?) that didn't pass simply had the input data commented out. AND, best of all, I'm told that the team is responsible for setting up AWS S3 and servers, networking, etc. No dedicated DevOps people. I don't do that stuff and when I've done it in the past, only in a 'dev' env. and not in 'prod'.
    Two other TBTF banks were bad as well, but nothing like CapOne. Un-real.

  • @Lambda.Function
    @Lambda.Function Год назад +218

    The real question is how the guy got away with it. That's a pretty textbook CFAA violation. I kinda died a little the second I saw that IMDS forwarded URL, anyone who's dealt with this before knew immediately what happened.

    • @ramielsayed2614
      @ramielsayed2614 Год назад +10

      @@raylopez99 well that's really fair

    • @f4ephilosophy691
      @f4ephilosophy691 Год назад +41

      @@ramielsayed2614 Actually gamed the system.

    • @raylopez99
      @raylopez99 Год назад +1

      @@f4ephilosophy691 would not surprise me if the dude squirreled away some money offshore and then pretended to have spent it all...

    • @TheShamefurDispray
      @TheShamefurDispray Год назад +26

      @@raylopez99 Oh it was someone even more institutionally privileged than a woman. Thanks for letting us know.

    • @BBWahoo
      @BBWahoo Год назад

      @@TheShamefurDispray
      That's why 10:40 happened I suppose, girls looking out for each other 🤣🤙

  • @Ashinle
    @Ashinle Год назад +3

    Your videos just have a flow and dry humour to them that makes it very entertaining to watch while still being informative and not being demeaning

  • @joachimbulow
    @joachimbulow Год назад +8

    Keep posting, Kevin! These videos are awesome - I will be recommending to people

  • @ergsegweargfsadf
    @ergsegweargfsadf Год назад +5

    the minecraft cli XDDDD man your editing is the best and story telling is top notch.

  • @hemerythrin
    @hemerythrin Год назад +7

    Love the editing in these postmortem videos!

  • @123gostly
    @123gostly Год назад +2

    Adding a comment to help engagement. This is a truly underrated channel.

  • @redandblue1013
    @redandblue1013 Год назад +1

    Just want to say your channel is amazing and I’m so glad I found it before it blew up

  • @_Jayonics
    @_Jayonics Год назад +262

    I love how the gist literally said: "Warning: use of these commands will get you arrested by the FBI, user discretion is advised" 😂
    And there was me thinking it was a rookie mistake making such a script public...

    • @Y2B123
      @Y2B123 Год назад +43

      I think it would have been quite clever to share the script had he used a more discreet account. A bunch of people downloading the data through Tor could create a lot of work for the investigators and thus help hide his identity.

    • @chainswordcs
      @chainswordcs Год назад +50

      the description says "This is not the actual Github file"

    • @OneIdeaTooMany
      @OneIdeaTooMany Год назад

      Someone honestly should go through AWS (and other providers) list of IP addresses and attempt to get the instance ID. If you can, report it to the cloud provider so hopefully they can inform the customers that are affected.

    • @danielo7985
      @danielo7985 Год назад +1

      @@Y2B123 They'll just look @ the 1st ip

    • @Bomkz
      @Bomkz Год назад +5

      @@danielo7985 would've worked if it weren't for the fact that the attacker used Tor.

  • @Chipotle14
    @Chipotle14 Год назад +2

    Lmaooo I love the Lavish Tesla pic for "automatic braking". Excellent, subbed.

  • @fleshinterface
    @fleshinterface Год назад +3

    their arch nemesis: the on-premises menace
    I love this channel

  • @HaidarHavana1998
    @HaidarHavana1998 Год назад +4

    Fun and educative video. Hope your channel blows up

  • @brys6577
    @brys6577 Год назад +14

    Capital one should probably incentivize giving people rewards for following their responsible disclosure agreement.

    • @IdgaradLyracant
      @IdgaradLyracant Год назад

      No. The problem is you'll get a pair of enterprising folks that will create trivial problems, then report them to get rewarded. Then someone will make a flaw they think is trivial, but turns out to be serious, and by the time it is corrected things go to hell very fast.

    • @interesting9688
      @interesting9688 10 месяцев назад

      They should; it would incentivize people more, but the FBI and others will pay millions to get some of these exploits; there's no competition if people do it for the money.

  • @mattmcmahon4240
    @mattmcmahon4240 Год назад +3

    As someone who knows cap1 senior devs I’m not surprised this video came out. Only it didn’t come out sooner.

  • @michaelashby9654
    @michaelashby9654 Год назад +25

    AWS should have two types of S3 buckets (public immutable, and private immutable). And that would solve a lot of problems.
    What I see happen is devs get confused by all the security configurations for S3. This isn't an excuse but I'm just saying what I see happen. The problem is that a private bucket can be changed to public.

    • @halfstream1461
      @halfstream1461 Год назад +9

      The amount of documentation you need to read to get the right permissions are just ridiculous if you don’t know what your doing. And most of devs who set this up aren’t experts in cybersecurity so it’s hard. That’s why pen testing is so damn important, even if it’s bloody expensive.

    • @ladyarmourlapras
      @ladyarmourlapras Год назад +8

      the process to unprivate a bucket is lengthy in itself. you need to uncheck/deselect/disable varying options across their submenus. all buckets are locked down by default with plenty of warnings screaming if something is public. company needs to also do their due diligence and actually prevent + detect anything thats been exposed to the internet.

    • @manapause
      @manapause Год назад +1

      That’s not what happened here though 😊 but it has been the source of many leaks before

    • @jimmyprior
      @jimmyprior Год назад +3

      S3 buckets are private by default for good reason. I really can’t see many good reasons to make a bucket public. Part of the billing is data transfer so allowing anyone to consume as much content in a bucket as often as they please is going to result in hefty bills.

  • @nicholasvinen
    @nicholasvinen Год назад +46

    Having a wide open reverse proxy on your corporate network seems like a terrible idea.

  • @nodrance
    @nodrance 10 месяцев назад +3

    blaming aws for this is ridiculous. It's not their job to forsee every possible stupid decision their customers could make. If someone set that bucket to public global unencrypted access, it wouldn't be AWS' job to shut that all down

  • @justingolden21
    @justingolden21 Год назад +5

    I say capital one's fault. They're using the service and AWS is only responsible for accurately telling them what they get and don't get. If Amazon guarantees something or misconstrues what they provide or fails to provide, it's their fault, else it's not. If Amazon says they get 99% uptime and they get 99% uptime, it's on the customer. That being said, sticky situation and one could make a case for either. I like the braking analogy as it's definitely a spectrum for what's "expected"/"reasonable" for example automatic advanced braking system vs just a working one in general. The difference is just the scale and what's "reasonably expected"

  • @BitwiseMobile
    @BitwiseMobile Год назад +23

    I was interviewed several times by Captial One about 5 years ago. I was a certified solution architect and I had put in my resume at some point. They were really trying to poach me, but three minutes into the interview I knew it was a clown college. Regarding AWS security - they are only responsible for data inside their network. They tell you this, and it's part of the practitioner and solution provider exams. If you are 100% serverless then AWS is 100% responsible for your data. As soon as you agree to manage your own server via an EC2 instance then you are responsible. Honestly I don't know why any org would need an EC2 instance when ECS is a viable alternative, and makes scaling zero effort. Scaling EC2 instances can be done, but it takes work, and it's susceptible to all the problems a non-managed solution has.

    • @zeytelaloi
      @zeytelaloi Год назад +1

      They probably just did a lift-n-shift from on-prem, before they had containerized their setup.

    • @jk2l
      @jk2l Год назад +2

      that's not how shared responsibility work... AWS responsible for the underneath infrastructure. so it is true if it is serverless AWS responsible the server that run the software. but the IAM permission, the code you run inside serverless is still responsible by the user who create it

  • @MRJMXHD
    @MRJMXHD Год назад

    Man, your way of explaining stuff is brilliant and easy to understand, even for a lay person. You deserve way more subs!!

  • @LFOD1776
    @LFOD1776 Год назад +1

    I have no idea what the hell that video was about.
    You engineers make civilized life possible and don’t get an iota of appreciation from the rest of us.

  • @MorpH2k
    @MorpH2k 10 месяцев назад +2

    The name of the VPN service "Ipredator" is.. one could call it "unfortunate", but it's probably deliberate. The service was created in direct response to the EU IPR directive, also known as IPRED, and the subsequent Swedish Intellectual Property law commonly known as the IRPED-law, which was basically about combating software piracy in general and, some would say, specifically made to attack The Pirate Bay.

  • @OneIdeaTooMany
    @OneIdeaTooMany Год назад +12

    What a fantastic video. Just goes to show that we need to be mindful of the security of our operating systems and applications.

  • @greenerell484
    @greenerell484 9 месяцев назад +1

    you can't even really be mad at the hacker for exploiting such a trivial weakness

  • @HolyOllie
    @HolyOllie Год назад +9

    Ooo! Another video 😊

  • @JB-fh1bb
    @JB-fh1bb Год назад +3

    8:07 it lived up to the WAF part of it’s namesake 😂😂😂

  • @Basu770
    @Basu770 Год назад

    Great video! i've been looking for more channels like this! Subscribed!

  • @phitc4242
    @phitc4242 Год назад +1

    I got an AWS ad on this video

  • @gblargg
    @gblargg Год назад +1

    I love all the explosions in your videos.

  • @David-bh7hs
    @David-bh7hs Год назад +7

    Like disruptTV without the distractions, just the info

  • @thewhitefalcon8539
    @thewhitefalcon8539 Год назад +1

    Even though AWS isn't responsible for this, it still upgraded IMDS to try and help its customers from making mistakes - not because it was responsible. It didn't have to do this, but it did.

  • @CasualXCars
    @CasualXCars Год назад +2

    Simple Storage Service... no security concerns here, it is just a "simple" service going on...
    Looking back at some of these leaks that involved S3 and AWS where companies "rushed" into selling the cloud idea to their senior leadership, seems like people had their own set goals to get the biggest bonus possible, and sell fancy terminology how company is modernizing, how company is adopting intelligent technology, etc. - but behind all that "fancy" is simply the same technology that was available before - just now, you pay the company to host it for you instead of building your own data center... hence, since you are "contracting out" that piece, it is inevitable that once again convenience comes at the price of security... So how does this happen? It happens when AWS tells the company this service comes with the shared responsibility - AWS is responsible for a piece of it, while the company handles a piece of it... in other words, unlikely that AWS will do something wrong, as they are in business in providing this up to a certain level and you get the whole encyclopedia of it what they do... companies??? Apparently not so much in CapitalOne case...
    Too bad that data breaches continue to happen, and penalties and fines companies end up with are nowhere near realistic ones to make a difference... "it's a speeding ticket" given their profits that measure in billions each quarter...

  • @epicman9105
    @epicman9105 Месяц назад +1

    HE POSTED THE CODE HE USED UNDER A PUBLIC REPO WITH HIS FULL NAME 💀💀💀💀💀

  • @guillaume5623
    @guillaume5623 Год назад +3

    This is gold ! Thank you

  • @Controllerhead
    @Controllerhead Год назад +2

    Capital One: Who's In Your Wallet?

  • @ai-spacedestructor
    @ai-spacedestructor Год назад +2

    imagine legitimately using bing and actually expecting a quality response.

  • @clayc9221
    @clayc9221 Год назад +1

    it was in the cloud, they should’ve known it would’ve rained down one day

  • @kacper9081
    @kacper9081 Год назад +1

    this channel will blow up soon

  • @h8f8
    @h8f8 Год назад +2

    Thank you for the great content to consume while snacking, from the editing to the info, good stuff :)

  • @Lochyj0001
    @Lochyj0001 Год назад +3

    Underrated channel

  • @MrJonathandsouza
    @MrJonathandsouza Год назад +2

    This is great content, Keep up the good work

  • @d3layd
    @d3layd Год назад +1

    Don't forget the counter-strike cli

  • @cgh2467
    @cgh2467 Год назад +12

    Glad AWS made some patches to help mitigate this. However this was 100% the fault of Capital One.
    Insecure software.
    An instance designed to serve public data had an IAM role to get and decrypt all data across all S3 buckets.
    AWS denies access by default. Allowing open access to S3 is deliberate.

  • @picklypt
    @picklypt Год назад +2

    Very good video. Love this type of story telling

  • @shubhamsawant1551
    @shubhamsawant1551 9 месяцев назад +1

    Some thing amaze mee is that who uploaded cred file to git repo and who made git repo public is operational team forgetting the severity of information

  • @kisaragi-hiu
    @kisaragi-hiu Год назад +2

    2:41 that's legit how I learned how CLIs work lol

  • @TheGamingInkling
    @TheGamingInkling Год назад

    Alright just one more video before I go to sleep
    The last video before I sleep:

  • @Hugos68
    @Hugos68 Год назад +1

    I love these videos, please keep making more

  • @Shaojeemy
    @Shaojeemy Год назад +2

    Money under the mattress is looking better and better

  • @RustyNova
    @RustyNova Год назад +7

    Amazon is not at fault. When the user can't do the proper things to secure their machines, then that's on them.

  • @greg-bc8ky
    @greg-bc8ky Год назад

    I literally just started working on their Cloud Security team and this is the first time I'm hearing of this smh

  • @joshuabrazile
    @joshuabrazile Год назад

    Some AWS consultant making $175k per year helped to cause this blunder. That's what pisses me off. 15 years in IT, never making big money and never making blunders that jeopardized users.

  • @YoanGonzalez-yr2rf
    @YoanGonzalez-yr2rf Год назад

    Love your slides lol

  • @aln447
    @aln447 Год назад

    Love the content man! You've just earned a sub

  • @timvw01
    @timvw01 Год назад

    This is a great channel

  • @egekaangurkan9481
    @egekaangurkan9481 Год назад

    This is my new fave channel

  • @Gastell0
    @Gastell0 Год назад +3

    1:43 - "The engineers tested the commands" wait wat, I hope they tested it in a clean vm isolated from everything including not being in same network address range as corp network right?

    • @lot.bajrami
      @lot.bajrami Год назад +1

      They could have done it in their private network but still someone probably used the commanda in another network. Even if you are in the company's private network, you still not be able to access all the data.

  • @XabGaming
    @XabGaming Год назад +1

    i love this video keep makingmore of it

  • @undivided_unified
    @undivided_unified Год назад +3

    2:27 ... for the lulz

  • @jerryjiggler
    @jerryjiggler Год назад +3

    Wasn't the Bing model trained on data from like 2019?

    • @kevinfaang
      @kevinfaang  Год назад +3

      GPT4 would be 2021, but I assume it can regurgitate more than it's training data since it uses the search engine.

  • @aintaintaword666
    @aintaintaword666 Год назад

    9:37 "google en pasent" - I see you are a man of culture!

  • @haxguy0
    @haxguy0 Год назад

    Wow, what an amazing video. Thank you

  • @kartik4792
    @kartik4792 Год назад

    Amazing! Instant subscribe + all notifications

  • @maxzak5310
    @maxzak5310 Год назад

    underrated channel

  • @gabriellindgren5079
    @gabriellindgren5079 Год назад +1

    Very interesting video, thank you!

  • @communitycollegegenius9684
    @communitycollegegenius9684 Год назад +8

    No mention at all for the responsibility AWS had to review/remove vulnerabilities and access when employees are termed. We have been doing that loosely for more than 2 decades, but now there is a checkbox that initiates a thoroughly organized team review that includes a think tank style catch-all: "worst case / what else". We routinely have meetings that start: "as you all know Timmy is gone and we will be updating everything". If neither of these shops do that; shame, shame, shame.

    • @OneIdeaTooMany
      @OneIdeaTooMany Год назад +7

      Because AWS isn't responsible. SSRF can be performed by anyone as long as they can connect to a webserver that is vulnerable to it. The instance metadata server is only accessible from inside of the instance. If someone is able to obtain data from a publicly accessible website from the imds server, then you haven't secured your webserver very well. I don't have imdsv2 enabled on my instances but then again my web servers aren't vulnerable to it and my instance profiles are fairly well locked down. Having said that, if I do live to regret my words, it's on me. I'm not going to go crying to AWS... I don't pay for support anyway..

  • @FSimon766
    @FSimon766 Год назад

    Im new here. Nice vid, subbed!

  • @johnstoia8153
    @johnstoia8153 Год назад +1

    Well made video 👍🏻

  • @wilsonwilson137
    @wilsonwilson137 Год назад +5

    No jail time??

    • @azrielsatan8693
      @azrielsatan8693 10 месяцев назад

      The court decided they couldn't be held responsible because they are trans.

  • @Axlefublr
    @Axlefublr Год назад

    Thanks for shouting out SlideToShutDown, it's honestly pretty cool and underrated

  • @aaronl19
    @aaronl19 Год назад +1

    9:33 holly he’ll!

  • @urbantiles
    @urbantiles Год назад +1

    I love your videos!

  • @carn941
    @carn941 Год назад +1

    Why do you not have a million subs?!

  • @trevise684
    @trevise684 Год назад +4

    amazing

  • @koltonriley5929
    @koltonriley5929 Год назад +2

    When a plane crashes, a government regelatory commission comes in am investigates, same goes with building collapses and factory accidents.
    We should have the same for software and technology. A government entity that does an investigation, and makes sure the company moves forward with correct steps and makes as much known to the public without sensitive info.

  • @allezvenga7617
    @allezvenga7617 Год назад

    Thanks for your sharing

  • @aidantilgner
    @aidantilgner Год назад

    Amazing quality man

  • @XabGaming
    @XabGaming Год назад +1

    wtf you need 1000x more views

  • @freem4nn129
    @freem4nn129 Год назад

    hahaha the on premises menace :D good one

  • @abbynormal1965
    @abbynormal1965 Год назад +7

    In my 35 years as an IT tech, I have come to the conclusion, If a system can be written, it is a system that can be hacked.

    • @17hanke26
      @17hanke26 Год назад +8

      The changes you've seen In your tech career must be astronomical!

  • @korhonenmikko
    @korhonenmikko 9 месяцев назад +1

    10:58 So what I'm hearing is that everything would have been fine if they had just stuck to COBOL like God intended.