What Capital One’s Data Breach Shows About Social Media Risk (2024)

The New York Times, CNN, and other media outlets recently published articles reporting that a software engineer in Seattle allegedly hacked into a server and obtained the personal data of over 100 million customers at Capital One. While this is not the first time Capital One has faced a major data breach, there were two things that made this case particularly notable. First, the breach is estimated to cost the bank up to $150 million and has been said to be one of the largest bank data breaches in history. Second, and of particular interest to HR leaders: the warning signs of this data breach were available right on public social media.

The suspect was Paige Thompson, 33, a former software engineer at Amazon Web Services, which hosted the database that was breached. Using the online alias “erratic,” Thompson had in many ways the persona typical of a software engineer in Seattle, participating in programming chatter with people in the field. However, her habit of oversharing also left a trail of digital breadcrumbs that led the FBI to her door. Thompson allegedly bragged about the breach on Twitter; shortly after the breach was discovered, she tweeted, “I have a whole list of things that will ensure my involuntary confinement from the world. I’m never coming back.”

Could Capital One have prevented this particular breach using social media data? Well, no. Thompson was not a Capital One employee, and the ‘trail of breadcrumbs’ that identified her as the suspect behind the hack was left after the breach had already occurred. But suppose Thompson was an employee at Capital One, or even Amazon. If that were the case, Amazon and Capital One could have had reams of information that painted a picture of who she was—a skilled programmer with a troubled past—and used social media screening to help prevent the attack.

Ms. Thompson was a skilled programmer. Her online presence made clear that she organized software engineering communities and meetups, a real positive in the eyes of many employers. According to former friends, she also had “a lot of potential to be very focused and do a lot in this world.” But along with the positive aspects of her profile were a host of troubled behaviors. In addition to her regular tweets, Thompson made many troubling posts over the years, speaking openly and darkly about her mental anguish, suicide ideation and use of both legal and illegal drugs.

Social media screening may have revealed key motives

Such a combination of data would have helped clue a potential employer in on her motivations. Even though she had allegedly bragged about the hacking, online community members who knew Thompson said they didn’t believe she had carried out the hack with malicious intent or for profit. They said they believed she thought the hack could bring her attention, respect and a new job. That reveals a much more nuanced psychological profile, and indicates that sometimes, an attack affecting hundreds of millions begins with one individual looking for some sort of recognition, more so than they are trying to commit an act of fraud.

“Harassing and threatening online behaviors are of significant concern to HR leaders. Those sorts of behaviors require immediate intervention, whether it’s a termination or legal action. Yet other indicators, such as frequent references to illegal drugs or self-harm, typically cause an employer to intervene with a welcoming or embracing message, to help that employee understand that there's a community that cares about them,” says our CEO Ben Mones.

It’s not hard to imagine how critical it would have been for Amazon to identify these signals early on if Thompson was at Amazon Web Services during the breach—or how a future hack might start with a disgruntled or desperate employee who might just need some recognition or help. Thompson’s story shows how a massive breach can begin with troubled behaviors. It also shows us how many of the warning signs are right under our noses, displayed in plain sight on the public web.

What Capital One’s Data Breach Shows About Social Media Risk (2024)
Top Articles
Remove a Play app from your Android device
Ledger Nano X
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6438

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.