Company Details
capital-one
81,873
1,054,217
52
capitalone.com
394
CAP_2048835
Completed


Capital One Company CyberSecurity Posture
capitalone.comAt Capital One, we're making things better for our customers and associates through innovation and collaboration. We were founded on the belief that everyone deserves financial freedom—and are dedicated to a world where all have equal opportunity to prosper. Banking is in our DNA, but we are so much more than a bank. We always think about what’s next—and how we can bring our customers the tools needed to improve their financial lives. Your ideas, experiences and skills will help make banking better. You’ll be part of a supportive culture while earning amazing benefits. That’s life at Capital One. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. View our Social Media Community Guidelines https://www.capitalone.com/digital/social-media/
Company Details
capital-one
81,873
1,054,217
52
capitalone.com
394
CAP_2048835
Completed
Between 600 and 649

Capital One Global Score (TPRM)XXXX

Description: In 2025, Capital One experienced a significant data breach due to a misconfigured web application firewall (WAF). Attackers exploited this vulnerability to steal AWS credentials and access 100 million customer records. The breach highlighted critical gaps in regular WAF rule audits, enforcement of multi-factor authentication for privileged accounts, and real-time API activity monitoring. Post-incident, Capital One implemented Lacework's AI-driven anomaly detection, reducing false positives by 70% and halving response times.
Description: The Washington State Office of the Attorney General reported a data breach involving Capital One on May 26, 2023. The breach occurred on February 1, 2023, affecting 605 Washington residents and potentially compromising their names, Social Security Numbers, and financial information.
Description: The Maine Office of the Attorney General reported a data breach involving Capital One on June 16, 2023. The breach occurred between August 11, 2022, and May 22, 2023, due to insider wrongdoing, impacting one Maine resident and affecting a total of 82 individuals. Personal information compromised included names, credit card numbers, Social Security numbers, and other financial details, and 24 months of free credit monitoring was offered to the affected individual.
Description: On March 22, 2021, the Maine Attorney General's Office reported a data breach involving Capital One, National Association, which occurred on November 10, 2020. The breach potentially exposed financial account numbers and affected a total of 426 individuals, including 2 residents of Maine. Although there is no evidence of data being breached, customers are at risk of future fraud, prompting notification and the offering of identity theft protection services.
Description: In April 2021, the Maine Office of the Attorney General disclosed an insider wrongdoing breach at Capital One, occurring between September 2, 2020, and February 25, 2021. The incident involved an internal actor who improperly accessed and potentially compromised sensitive personal information of at least one Maine resident, including credit card account numbers and Social Security numbers. Such data exposure poses significant risks, including identity theft, financial fraud, and long-term reputational harm to the affected individual. In response, Capital One provided 24 months of free credit monitoring via TransUnion’s *myTrueIdentity* service to mitigate potential damages. The breach highlights vulnerabilities in internal controls, emphasizing the critical need for robust insider threat detection and access governance to prevent unauthorized data handling by employees or contractors.
Description: The Maine Office of the Attorney General reported that Capital One experienced a data breach involving unauthorized access by a former employee from May 15, 2020, to June 2, 2020. A total of 1,277 individuals were affected, including eight Maine residents whose personal information such as names, addresses, Social Security numbers, and account numbers may have been accessed. Capital One has provided these residents with written notification and offered two years of free credit monitoring through TransUnion.
Description: Capital One, the Virginia-based bank with a popular credit card business, announced that a hacker had accessed about 100 million credit card applications. It was also found that thousands of Social Security and bank account numbers were also taken. The FBI has arrested a Seattle-area woman, Paige A. Thompson, on a charge of computer fraud and abuse, according to court records. The hack was expected to cost the company between $100 million and $150 million in the near term.
Description: In 2019, Capital One suffered a massive data breach exposing the sensitive personal and financial information of 100 million customers, including Social Security numbers (SSNs), bank account details, credit scores, and transaction data. The breach stemmed from a misconfigured firewall in the bank’s cloud infrastructure, exploited by a hacker who gained unauthorized access. Beyond the immediate data exposure, the incident eroded public trust, triggered regulatory scrutiny, and led to a $425 million class-action settlement one of the largest in U.S. banking history. The settlement addressed both the breach and allegations of deceptive marketing tied to the bank’s 360 Savings accounts, where customers claimed they received lower interest rates than advertised. The fallout included financial restitution ($300M in cash payments, $125M in interest adjustments), reputational damage, and heightened compliance demands. The breach underscored systemic vulnerabilities in financial institutions’ cybersecurity practices, particularly in securing cloud-based customer data.
Description: The California Office of the Attorney General reported a data breach by Capital One involving unauthorized access to personal information on August 12, 2019. The breach occurred on March 22 and 23, 2019, affecting approximately 140,000 Social Security numbers and 80,000 linked bank account numbers, along with various personal details of individuals who applied for or were customers of Capital One's credit card products.
Description: The California Attorney General reported a data breach involving Capital One on February 6, 2017. The breach involved unauthorized access to customer accounts using stolen usernames and passwords, potentially affecting personal information such as names, addresses, and account numbers. Specific details about the number of individuals affected and the exact date of the breach are unknown.
Description: The California Office of the Attorney General reported a data breach involving Capital One Services, LLC on August 9, 2018. The breach occurred between January 27, 2017, and April 20, 2017, potentially affecting personal information of 586 California residents, including names, addresses, account numbers, telephone numbers, transaction history, dates of birth, and Social Security numbers.


No incidents recorded for Capital One in 2026.
No incidents recorded for Capital One in 2026.
No incidents recorded for Capital One in 2026.
Capital One cyber incidents detection timeline including parent company and subsidiaries

At Capital One, we're making things better for our customers and associates through innovation and collaboration. We were founded on the belief that everyone deserves financial freedom—and are dedicated to a world where all have equal opportunity to prosper. Banking is in our DNA, but we are so much more than a bank. We always think about what’s next—and how we can bring our customers the tools needed to improve their financial lives. Your ideas, experiences and skills will help make banking better. You’ll be part of a supportive culture while earning amazing benefits. That’s life at Capital One. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. View our Social Media Community Guidelines https://www.capitalone.com/digital/social-media/


At TIAA, we believe everyone has the right to retire with dignity. For more than 100 years, we’ve provided retirement plans, insurance, and investment services, empowering millions of people— in education, healthcare, and nonprofit —with the knowledge, guidance, and lifetime income needed to plan th

NN Group is an international financial services company, active in 10 countries, with a strong presence in a number of European countries and Japan. Our roots lie in the Netherlands, with a rich history of more than 175 years. With our 15,000 employees, NN Group provides retirement services, pensio

Danske Bank – A driver of growth and development For more than a 150 years, Danske Bank has strived to be a driver of growth and development in society. We have developed in tandem with the societies we are part of, and our advisory services, expertise and financial solutions have helped individual

Navy Federal is the world’s largest credit union, with more than 15 million members, $190 billion+ in assets and 25,000+ employees. Throughout campuses in Vienna, VA Pensacola, FL and Winchester, VA, as well as 370 branches, we serve the Armed Forces, Department of Defense, Veterans and their famili

Edward Jones is a leading North American financial services firm in the U.S. and through its affiliate in Canada. The firm’s more than 20,000 financial advisors throughout North America serve more than 9 million clients with a total of $2.2 trillion in client assets under care as of December 31, 202

For more than 240 years BNY has partnered alongside clients, using its expertise and platforms to help them operate more efficiently and accelerate growth. Today BNY serves over 90% of Fortune 100 companies and nearly all the top 100 banks globally. BNY supports governments in funding local projects

Great companies have an enduring sense of purpose. At M&T, our purpose is a simple one: make a difference in people’s lives and uplift the diverse communities we serve. Founded in 1856 in Buffalo, NY we are now a top 11 full-service US-based commercial bank with a retail footprint across the east co

Sparkassen: Nah, präsent und persönlich Als verlässliche Hausbank stehen wir immer und überall an der Seite unserer Kund:innen und Mitarbeitenden. Mit den Sparkassen können Sie auf exzellente Beratung und einen echten Finanzverbund zählen, der nicht nur Ihre persönlichen Finanzen, sondern auch die f

From the largest cities to the smallest villages, India is filled with ambition and enterprise. As Indians from all walks of life set out to write their growth story, our timely and affordable credit empowers them to bring their dreams alive. As part of the TVS Group, we empower Indians from vario
.png)
After completing a summer internship with Capital One, Tupac Holmes has already secured his next step: a full-time position in the company's Cybersecurity...
A widespread Amazon Web Services (AWS) outage on Monday disrupted operations for millions of users worldwide, knocking out access to...
Degrees: B.S. in Computer Science and Information Security (2025); M.S. in Digital Forensics & Cybersecurity (2026)
Glilot Capital, one of Israel's largest venture capital funds, said on Wednesday it had raised $500 million for two new early-stage funds to...
Attaullah Baig, fired this year for alleged poor performance, said he had warned Mark Zuckerberg engineers had unaudited access to user...
Broadridge CISO David Ramirez discusses how defenders can stay ahead of attackers in the AI arms race.
Tidal Cyber, a Virginia-based cybersecurity company focused on Threat-Led Defence, has raised $10m in a Series A round led by Bright Pixel...
The startups make up more than one-third of Notable Capital's 'Rising in Cyber 2025' list of 30 companies solving the most urgent challenges...
Alyson Conley, a federal leader with a background in cybersecurity and public administration, has transitioned into the private sector,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Capital One is http://www.capitalone.com.
According to Rankiteo, Capital One’s AI-generated cybersecurity score is 645, reflecting their Poor security posture.
According to Rankiteo, Capital One currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Capital One has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Capital One is not certified under SOC 2 Type 1.
According to Rankiteo, Capital One does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Capital One is not listed as GDPR compliant.
According to Rankiteo, Capital One does not currently maintain PCI DSS compliance.
According to Rankiteo, Capital One is not compliant with HIPAA regulations.
According to Rankiteo,Capital One is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Capital One operates primarily in the Financial Services industry.
Capital One employs approximately 81,873 people worldwide.
Capital One presently has no subsidiaries across any sectors.
Capital One’s official LinkedIn profile has approximately 1,054,217 followers.
Capital One is classified under the NAICS code 52, which corresponds to Finance and Insurance.
Yes, Capital One has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/capital-one.
Yes, Capital One maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/capital-one.
As of January 25, 2026, Rankiteo reports that Capital One has experienced 11 cybersecurity incidents.
Capital One has an estimated 30,838 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $679.35 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with lacework’s ai-driven anomaly detection, and remediation measures with implemented lacework’s ai-driven anomaly detection, reducing false positives by 70% while halving response times., and enhanced monitoring with real-time api activity monitoring, and communication strategy with notification and offering of identity theft protection services, and communication strategy with written notification to affected residents and offer of two years of free credit monitoring through transunion, and and third party assistance with transunion (mytrueidentity credit monitoring), and and remediation measures with offered 24 months of free credit monitoring to the affected individual, and communication strategy with public disclosure via maine office of the attorney general, and incident response plan activated with yes (immediate containment and fbi notification), and third party assistance with amazon web services (aws), third party assistance with cybersecurity forensics firms, third party assistance with legal counsel, and law enforcement notified with yes (fbi arrested threat actor paige thompson in 2019), and containment measures with isolated affected aws servers, containment measures with revoked unauthorized access, containment measures with patched misconfigured waf, and remediation measures with enhanced cloud security controls, remediation measures with multi-factor authentication (mfa) enforcement, remediation measures with customer notification and credit monitoring services (2019), and recovery measures with $425m settlement fund (2025), recovery measures with automated compensation for eligible customers, recovery measures with increased interest payments for affected savings accounts, and communication strategy with public disclosure (2019), communication strategy with dedicated settlement website (https://www.capitalonesettlement.com/), communication strategy with direct notifications to eligible customers (2025), communication strategy with faqs and customer support channels, and network segmentation with implemented post-breach, and enhanced monitoring with yes (continuous threat detection for cloud environments)..
Title: Capital One Data Breach
Description: A hacker accessed about 100 million credit card applications and thousands of Social Security and bank account numbers.
Type: Data Breach
Threat Actor: Paige A. Thompson
Title: Capital One Firewall Misconfiguration (2025)
Description: Attackers exploited a misconfigured web application firewall (WAF) to steal AWS credentials, accessing 100 million customer records. The breach highlighted gaps in regular WAF rule audits, multi-factor authentication (MFA) enforcement for privileged accounts, and real-time API activity monitoring.
Date Detected: 2025
Type: Data Breach
Attack Vector: Misconfigured Firewall
Vulnerability Exploited: Misconfigured WAF
Motivation: Data Theft
Title: Capital One Data Breach
Description: Unauthorized access to personal information including Social Security numbers and bank account numbers.
Date Detected: 2019-08-12
Date Publicly Disclosed: 2019-08-12
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Capital One Data Breach
Description: The California Attorney General reported a data breach involving Capital One on February 6, 2017. The breach involved unauthorized access to customer accounts using stolen usernames and passwords, potentially affecting personal information such as names, addresses, and account numbers. Specific details about the number of individuals affected and the exact date of the breach are unknown.
Date Publicly Disclosed: 2017-02-06
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Stolen Usernames and Passwords
Title: Capital One Data Breach
Description: The Maine Office of the Attorney General reported a data breach involving Capital One on June 16, 2023. The breach occurred between August 11, 2022, and May 22, 2023, due to insider wrongdoing, impacting one Maine resident and affecting a total of 82 individuals. Personal information compromised included names, credit card numbers, Social Security numbers, and other financial details, and 24 months of free credit monitoring was offered to the affected individual.
Date Detected: 2023-06-16
Date Publicly Disclosed: 2023-06-16
Type: Data Breach
Attack Vector: Insider Wrongdoing
Threat Actor: Insider
Title: Capital One Data Breach
Description: A data breach involving Capital One, National Association, potentially exposed financial account numbers and affected a total of 426 individuals, including 2 residents of Maine.
Date Detected: 2021-03-22
Date Publicly Disclosed: 2021-03-22
Type: Data Breach
Title: Capital One Data Breach
Description: The Washington State Office of the Attorney General reported a data breach involving Capital One on May 26, 2023. The breach occurred on February 1, 2023, affecting 605 Washington residents and potentially compromising their names, Social Security Numbers, and financial information.
Date Detected: 2023-02-01
Date Publicly Disclosed: 2023-05-26
Type: Data Breach
Title: Capital One Data Breach
Description: Unauthorized access by a former employee from May 15, 2020, to June 2, 2020, affecting 1,277 individuals, including eight Maine residents whose personal information may have been accessed.
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Former Employee
Title: Capital One Data Breach
Description: The California Office of the Attorney General reported a data breach involving Capital One Services, LLC on August 9, 2018. The breach occurred between January 27, 2017, and April 20, 2017, potentially affecting personal information of 586 California residents, including names, addresses, account numbers, telephone numbers, transaction history, dates of birth, and Social Security numbers.
Date Detected: 2018-08-09
Date Publicly Disclosed: 2018-08-09
Type: Data Breach
Title: Capital One Insider Wrongdoing Breach (2021)
Description: On April 22, 2021, the Maine Office of the Attorney General reported that Capital One experienced an insider wrongdoing breach affecting one Maine resident. The breach took place between September 2, 2020, and February 25, 2021, potentially compromising sensitive personal information, including credit card account numbers and Social Security numbers. Capital One offered 24 months of free credit monitoring through TransUnion's myTrueIdentity service to the affected individual.
Date Detected: 2021-02-25
Date Publicly Disclosed: 2021-04-22
Type: Insider Threat / Data Breach
Attack Vector: Insider Wrongdoing
Threat Actor: Insider (Employee/Contractor)
Title: Capital One Data Breach and Class Action Settlement (2019-2025)
Description: The Capital One $425M class action settlement addresses a 2019 data breach that compromised 100 million customers’ sensitive data, including SSNs, credit information, and account details. The settlement also resolves allegations of unfair industry rate practices related to the bank's 360 savings accounts, where customers allegedly received lower-than-advertised rates. Eligible customers (those with active 360 savings accounts between September 2019 and June 2025) are entitled to compensation through direct deposits or checks, with a total settlement fund of $425M allocated as $300M for cash payments and $125M for increased interest. The settlement is pending final court approval (hearing scheduled for November 6, 2025), with distributions expected in early 2026.
Date Detected: 2019-07-19
Date Publicly Disclosed: 2019-07-29
Type: Data Breach
Attack Vector: Misconfigured Web Application Firewall (WAF) on AWS cloud infrastructure
Vulnerability Exploited: Improper access controls in Capital One's cloud-based firewall (AWS S3 bucket misconfiguration)
Threat Actor: Name: Paige A. ThompsonAlias: erraticMotivation: ['Financial Gain', 'Notoriety']Nationality: American
Motivation: Financial TheftFraudExploitation of Misconfigured Systems
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Misconfigured WAF and Misconfigured AWS Web Application Firewall (WAF).

Financial Loss: $100 million$150 million
Data Compromised: Credit card applications, Social security numbers, Bank account numbers

Financial Loss: $4.35 million
Data Compromised: 100 million records
Brand Reputation Impact: Reputational damage
Legal Liabilities: Regulatory penalties under GDPR and HIPAA

Data Compromised: Social security numbers, Bank account numbers, Personal details

Data Compromised: Names, Addresses, Account numbers

Data Compromised: Names, Credit card numbers, Social security numbers, Other financial details

Data Compromised: Financial account numbers
Identity Theft Risk: High

Data Compromised: Names, Social security numbers, Financial information

Data Compromised: Names, Addresses, Social security numbers, Account numbers

Data Compromised: Names, Addresses, Account numbers, Telephone numbers, Transaction history, Dates of birth, Social security numbers

Brand Reputation Impact: Potential (limited to one individual)
Identity Theft Risk: True
Payment Information Risk: True

Financial Loss: $425M (settlement amount)
Data Compromised: Social security numbers (ssns), Credit scores, Transaction data, Bank account numbers, Personal identifiable information (pii), Credit card application data (2005-2019)
Systems Affected: AWS Cloud InfrastructureCapital One Credit Card Application SystemCustomer Savings Accounts (360 Savings)
Operational Impact: Significant reputational damage; regulatory scrutiny; customer trust erosion; legal and compliance costs
Customer Complaints: Widespread complaints regarding misleading marketing practices for 360 savings accounts (lower-than-advertised interest rates)
Brand Reputation Impact: Severe damage due to breach and subsequent allegations of unfair practices; loss of customer trust
Legal Liabilities: $425M class action settlementPotential regulatory fines (e.g., CFPB, OCC)Ongoing litigation from state attorneys general (e.g., New York)
Identity Theft Risk: High (due to exposure of SSNs and PII)
Payment Information Risk: High (bank account numbers and credit card data exposed)
Average Financial Loss: The average financial loss per incident is $61.76 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credit Card Applications, Social Security Numbers, Bank Account Numbers, , Customer Records, Social Security Numbers, Bank Account Numbers, Personal Details, , Personal Information, , Names, Credit Card Numbers, Social Security Numbers, Other Financial Details, , Financial Account Numbers, , Names, Social Security Numbers, Financial Information, , Names, Addresses, Social Security Numbers, Account Numbers, , Names, Addresses, Account Numbers, Telephone Numbers, Transaction History, Dates Of Birth, Social Security Numbers, , Credit Card Account Numbers, Social Security Numbers (Ssn), , Personally Identifiable Information (Pii), Financial Data, Credit History, Transaction Records and .

Entity Name: Capital One
Entity Type: Bank
Industry: Financial Services
Location: Virginia
Customers Affected: 100 million

Entity Name: Capital One
Entity Type: Financial Services
Industry: Finance
Customers Affected: 100 million

Entity Name: Capital One
Entity Type: Financial Institution
Industry: Finance

Entity Name: Capital One
Entity Type: Financial Institution
Industry: Banking

Entity Name: Capital One
Entity Type: Financial Institution
Industry: Finance
Customers Affected: 82

Entity Name: Capital One, National Association
Entity Type: Financial Institution
Industry: Banking
Customers Affected: 426

Entity Name: Capital One
Entity Type: Financial Institution
Industry: Finance
Location: Washington
Customers Affected: 605

Entity Name: Capital One
Entity Type: Financial Institution
Industry: Banking
Customers Affected: 1277

Entity Name: Capital One Services, LLC
Entity Type: Financial Services
Industry: Banking
Location: California
Customers Affected: 586

Entity Name: Capital One
Entity Type: Financial Services
Industry: Banking/Financial
Location: United States (Maine resident affected)
Customers Affected: 1

Entity Name: Capital One Financial Corporation
Entity Type: Banking Institution
Industry: Financial Services
Location: McLean, Virginia, USA
Size: Fortune 500 company (100M+ customers affected)
Customers Affected: 100,000,000+ (U.S. and Canada)

Entity Name: Capital One 360 Savings Account Holders
Entity Type: Customers
Location: USA
Customers Affected: Eligible account holders between September 18, 2019, and June 16, 2025


Third Party Assistance: Lacework’s AI-driven anomaly detection
Remediation Measures: Implemented Lacework’s AI-driven anomaly detection, reducing false positives by 70% while halving response times.
Enhanced Monitoring: Real-time API activity monitoring

Communication Strategy: Notification and offering of identity theft protection services

Communication Strategy: Written notification to affected residents and offer of two years of free credit monitoring through TransUnion

Incident Response Plan Activated: True
Third Party Assistance: TransUnion (myTrueIdentity credit monitoring)
Remediation Measures: Offered 24 months of free credit monitoring to the affected individual
Communication Strategy: Public disclosure via Maine Office of the Attorney General

Incident Response Plan Activated: Yes (immediate containment and FBI notification)
Third Party Assistance: Amazon Web Services (Aws), Cybersecurity Forensics Firms, Legal Counsel.
Law Enforcement Notified: Yes (FBI arrested threat actor Paige Thompson in 2019)
Containment Measures: Isolated affected AWS serversRevoked unauthorized accessPatched misconfigured WAF
Remediation Measures: Enhanced cloud security controlsMulti-factor authentication (MFA) enforcementCustomer notification and credit monitoring services (2019)
Recovery Measures: $425M settlement fund (2025)Automated compensation for eligible customersIncreased interest payments for affected savings accounts
Communication Strategy: Public disclosure (2019)Dedicated settlement website (https://www.capitalonesettlement.com/)Direct notifications to eligible customers (2025)FAQs and customer support channels
Network Segmentation: Implemented post-breach
Enhanced Monitoring: Yes (continuous threat detection for cloud environments)
Incident Response Plan: The company's incident response plan is described as Yes (immediate containment and FBI notification).
Third-Party Assistance: The company involves third-party assistance in incident response through Lacework’s AI-driven anomaly detection, TransUnion (myTrueIdentity credit monitoring), Amazon Web Services (AWS), Cybersecurity Forensics Firms, Legal Counsel, .

Type of Data Compromised: Credit card applications, Social security numbers, Bank account numbers
Number of Records Exposed: 100 million

Type of Data Compromised: Customer Records
Number of Records Exposed: 100 million

Type of Data Compromised: Social security numbers, Bank account numbers, Personal details
Number of Records Exposed: 140,000 Social Security numbers, 80,000 bank account numbers
Sensitivity of Data: High

Type of Data Compromised: Personal information
Personally Identifiable Information: NamesAddressesAccount Numbers

Type of Data Compromised: Names, Credit card numbers, Social security numbers, Other financial details
Number of Records Exposed: 82
Sensitivity of Data: High

Type of Data Compromised: Financial account numbers
Number of Records Exposed: 426
Sensitivity of Data: High

Type of Data Compromised: Names, Social security numbers, Financial information
Number of Records Exposed: 605
Sensitivity of Data: High

Type of Data Compromised: Names, Addresses, Social security numbers, Account numbers
Number of Records Exposed: 1277
Sensitivity of Data: High

Type of Data Compromised: Names, Addresses, Account numbers, Telephone numbers, Transaction history, Dates of birth, Social security numbers
Number of Records Exposed: 586
Sensitivity of Data: High

Type of Data Compromised: Credit card account numbers, Social security numbers (ssn)
Number of Records Exposed: 1
Sensitivity of Data: High (PII, Financial Data)

Type of Data Compromised: Personally identifiable information (pii), Financial data, Credit history, Transaction records
Number of Records Exposed: 100,000,000+ (U.S. and Canada)
Sensitivity of Data: High (SSNs, bank account details, credit scores)
Data Exfiltration: Yes (data stolen and partially leaked online)
Data Encryption: No (data stored in unencrypted S3 buckets)
File Types Exposed: PDFsCSV filesDatabase dumps
Personally Identifiable Information: Yes (names, addresses, SSNs, dates of birth)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implemented Lacework’s AI-driven anomaly detection, reducing false positives by 70% while halving response times., Offered 24 months of free credit monitoring to the affected individual, Enhanced cloud security controls, Multi-factor authentication (MFA) enforcement, Customer notification and credit monitoring services (2019), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolated affected aws servers, revoked unauthorized access, patched misconfigured waf and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through $425M settlement fund (2025), Automated compensation for eligible customers, Increased interest payments for affected savings accounts, .

Regulatory Notifications: Maine Office of the Attorney General

Regulations Violated: Gram-Leach-Bliley Act (GLBA), New York Department of Financial Services (NYDFS) Cybersecurity Regulation, Potential violations of Federal Trade Commission (FTC) Act (misleading marketing practices),
Fines Imposed: $80M (OCC fine in 2020) + $425M settlement
Legal Actions: Class action lawsuit (settled in 2025), Criminal charges against Paige Thompson (2022 conviction), Ongoing scrutiny by state attorneys general (e.g., New York),
Regulatory Notifications: OCCCFPBState Attorneys GeneralFBI
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuit (settled in 2025), Criminal charges against Paige Thompson (2022 conviction), Ongoing scrutiny by state attorneys general (e.g., New York), .

Lessons Learned: Regular WAF rule audits, MFA enforcement for privileged accounts, real-time API activity monitoring

Lessons Learned: Critical importance of cloud security configurations (e.g., AWS S3 bucket permissions), Need for continuous monitoring and auditing of third-party infrastructure, Transparency in marketing practices to avoid customer distrust, Proactive incident response and customer communication strategies

Recommendations: Implement zero-trust architecture for cloud environments, Regular penetration testing and red team exercises, Enhance employee training on secure coding and access controls, Establish clearer internal policies for interest rate disclosures, Strengthen partnerships with law enforcement for threat intelligence sharingImplement zero-trust architecture for cloud environments, Regular penetration testing and red team exercises, Enhance employee training on secure coding and access controls, Establish clearer internal policies for interest rate disclosures, Strengthen partnerships with law enforcement for threat intelligence sharingImplement zero-trust architecture for cloud environments, Regular penetration testing and red team exercises, Enhance employee training on secure coding and access controls, Establish clearer internal policies for interest rate disclosures, Strengthen partnerships with law enforcement for threat intelligence sharingImplement zero-trust architecture for cloud environments, Regular penetration testing and red team exercises, Enhance employee training on secure coding and access controls, Establish clearer internal policies for interest rate disclosures, Strengthen partnerships with law enforcement for threat intelligence sharingImplement zero-trust architecture for cloud environments, Regular penetration testing and red team exercises, Enhance employee training on secure coding and access controls, Establish clearer internal policies for interest rate disclosures, Strengthen partnerships with law enforcement for threat intelligence sharing
Key Lessons Learned: The key lessons learned from past incidents are Regular WAF rule audits, MFA enforcement for privileged accounts, real-time API activity monitoringCritical importance of cloud security configurations (e.g., AWS S3 bucket permissions),Need for continuous monitoring and auditing of third-party infrastructure,Transparency in marketing practices to avoid customer distrust,Proactive incident response and customer communication strategies.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Enhance employee training on secure coding and access controls, Implement zero-trust architecture for cloud environments, Strengthen partnerships with law enforcement for threat intelligence sharing, Establish clearer internal policies for interest rate disclosures and Regular penetration testing and red team exercises.

Source: California Office of the Attorney General
Date Accessed: 2019-08-12

Source: Maine Office of the Attorney General
Date Accessed: 2023-06-16

Source: Washington State Office of the Attorney General
Date Accessed: 2023-05-26

Source: Maine Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2018-08-09

Source: Maine Office of the Attorney General
Date Accessed: 2021-04-22

Source: Capital One Settlement Official Website
URL: https://www.capitalonesettlement.com/
Date Accessed: 2025-10-01

Source: U.S. Department of Justice (Paige Thompson Indictment)
URL: https://www.justice.gov/usao-wdwa/pr/seattle-woman-charged-capital-one-data-breach
Date Accessed: 2019-07-29

Source: OCC Consent Order (2020)
URL: https://www.occ.gov/news-issuances/news-releases/2020/nr-occ-2020-108.html
Date Accessed: 2020-08-06

Source: New York Attorney General Press Release
Date Accessed: 2025-09-15
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2019-08-12, and Source: California Attorney GeneralDate Accessed: 2017-02-06, and Source: Maine Office of the Attorney GeneralDate Accessed: 2023-06-16, and Source: Maine Attorney General's OfficeDate Accessed: 2021-03-22, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-05-26, and Source: Maine Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2018-08-09, and Source: Maine Office of the Attorney GeneralDate Accessed: 2021-04-22, and Source: Capital One Settlement Official WebsiteUrl: https://www.capitalonesettlement.com/Date Accessed: 2025-10-01, and Source: U.S. Department of Justice (Paige Thompson Indictment)Url: https://www.justice.gov/usao-wdwa/pr/seattle-woman-charged-capital-one-data-breachDate Accessed: 2019-07-29, and Source: OCC Consent Order (2020)Url: https://www.occ.gov/news-issuances/news-releases/2020/nr-occ-2020-108.htmlDate Accessed: 2020-08-06, and Source: New York Attorney General Press ReleaseUrl: https://ag.ny.gov/press-release/2025/attorney-general-james-secures-425m-capital-one-over-data-breach-andDate Accessed: 2025-09-15.

Investigation Status: Disclosed (no further details provided)

Investigation Status: Closed (breach investigation completed; settlement pending final court approval on November 6, 2025)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification and offering of identity theft protection services, Written notification to affected residents and offer of two years of free credit monitoring through TransUnion, Public disclosure via Maine Office of the Attorney General, Public Disclosure (2019), Dedicated Settlement Website (Https://Www.Capitalonesettlement.Com/), Direct Notifications To Eligible Customers (2025) and Faqs And Customer Support Channels.

Customer Advisories: Notification and offering of identity theft protection services

Customer Advisories: Offered 24 months of free credit monitoring (TransUnion myTrueIdentity)

Stakeholder Advisories: Customers Advised To Update Payment Details By October 2, 2025, Investors Notified Of Financial Impact In Sec Filings, Regulators Provided Periodic Updates On Remediation Progress.
Customer Advisories: Eligible customers automatically enrolled; no claim filing requiredDirect deposits or checks issued post-approval (early 2026)Warning against phishing scams impersonating settlement administrators
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification and offering of identity theft protection services, Offered 24 months of free credit monitoring (TransUnion myTrueIdentity), Customers Advised To Update Payment Details By October 2, 2025, Investors Notified Of Financial Impact In Sec Filings, Regulators Provided Periodic Updates On Remediation Progress, Eligible Customers Automatically Enrolled; No Claim Filing Required, Direct Deposits Or Checks Issued Post-Approval (Early 2026), Warning Against Phishing Scams Impersonating Settlement Administrators and .

Entry Point: Misconfigured WAF

Entry Point: Misconfigured AWS Web Application Firewall (WAF)
Reconnaissance Period: 2019-03 to 2019-07 (Thompson exploited vulnerability for months)
Backdoors Established: Yes (persistent access to Capital One's cloud servers)
High Value Targets: Credit Card Application Data (2005-2019), 360 Savings Account Holder Pii,
Data Sold on Dark Web: Credit Card Application Data (2005-2019), 360 Savings Account Holder Pii,

Root Causes: Misconfigured WAF
Corrective Actions: Implemented Lacework’s AI-driven anomaly detection, reducing false positives by 70% while halving response times.

Root Causes: Inadequate Cloud Security Controls (Aws S3 Bucket Misconfiguration), Lack Of Real-Time Monitoring For Anomalous Access, Over-Reliance On Third-Party (Aws) Without Sufficient Oversight, Misleading Marketing Practices For 360 Savings Accounts (Contributed To Lawsuit),
Corrective Actions: Overhauled Cloud Security Posture (E.G., Automated Permission Reviews), Launched Customer Compensation Program ($425M Settlement), Enhanced Transparency In Interest Rate Disclosures, Expanded Cybersecurity Team And Incident Response Capabilities,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Lacework’s AI-driven anomaly detection, Real-time API activity monitoring, TransUnion (myTrueIdentity credit monitoring), Amazon Web Services (Aws), Cybersecurity Forensics Firms, Legal Counsel, , Yes (continuous threat detection for cloud environments).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implemented Lacework’s AI-driven anomaly detection, reducing false positives by 70% while halving response times., Overhauled Cloud Security Posture (E.G., Automated Permission Reviews), Launched Customer Compensation Program ($425M Settlement), Enhanced Transparency In Interest Rate Disclosures, Expanded Cybersecurity Team And Incident Response Capabilities, .
Last Attacking Group: The attacking group in the last incident were an Paige A. Thompson, Insider, Former Employee, Insider (Employee/Contractor), Name: Paige A. ThompsonAlias: erraticMotivation: ['Financial Gain' and 'Notoriety']Nationality: American.
Most Recent Incident Detected: The most recent incident detected was on 2025.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-07-29.
Highest Financial Loss: The highest financial loss from an incident was $4.35 million.
Most Significant Data Compromised: The most significant data compromised in an incident were credit card applications, Social Security numbers, bank account numbers, , 100 million records, Social Security numbers, Bank account numbers, Personal details, , Names, Addresses, Account Numbers, , names, credit card numbers, Social Security numbers, other financial details, , financial account numbers, , names, Social Security Numbers, financial information, , Names, Addresses, Social Security numbers, Account numbers, , names, addresses, account numbers, telephone numbers, transaction history, dates of birth, Social Security numbers, , , Social Security Numbers (SSNs), Credit Scores, Transaction Data, Bank Account Numbers, Personal Identifiable Information (PII), Credit Card Application Data (2005-2019) and .
Most Significant System Affected: The most significant system affected in an incident was AWS Cloud InfrastructureCapital One Credit Card Application SystemCustomer Savings Accounts (360 Savings).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Lacework’s AI-driven anomaly detection, TransUnion (myTrueIdentity credit monitoring), amazon web services (aws), cybersecurity forensics firms, legal counsel, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolated affected AWS serversRevoked unauthorized accessPatched misconfigured WAF.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were financial account numbers, Bank Account Numbers, names, telephone numbers, financial information, Account Numbers, Credit Scores, Personal Identifiable Information (PII), Transaction Data, credit card applications, Names, Social Security Numbers (SSNs), 100 million records, Account numbers, Bank account numbers, account numbers, Personal details, Credit Card Application Data (2005-2019), Social Security Numbers, other financial details, bank account numbers, addresses, dates of birth, Social Security numbers, transaction history, credit card numbers and Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 300.2M.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $80M (OCC fine in 2020) + $425M settlement.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuit (settled in 2025), Criminal charges against Paige Thompson (2022 conviction), Ongoing scrutiny by state attorneys general (e.g., New York), .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive incident response and customer communication strategies.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance employee training on secure coding and access controls, Implement zero-trust architecture for cloud environments, Strengthen partnerships with law enforcement for threat intelligence sharing, Establish clearer internal policies for interest rate disclosures and Regular penetration testing and red team exercises.
Most Recent Source: The most recent source of information about an incident are Maine Attorney General's Office, California Attorney General, U.S. Department of Justice (Paige Thompson Indictment), California Office of the Attorney General, Maine Office of the Attorney General, Capital One Settlement Official Website, Washington State Office of the Attorney General, OCC Consent Order (2020) and New York Attorney General Press Release.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.capitalonesettlement.com/, https://www.justice.gov/usao-wdwa/pr/seattle-woman-charged-capital-one-data-breach, https://www.occ.gov/news-issuances/news-releases/2020/nr-occ-2020-108.html, https://ag.ny.gov/press-release/2025/attorney-general-james-secures-425m-capital-one-over-data-breach-and .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed (no further details provided).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to update payment details by October 2, 2025, Investors notified of financial impact in SEC filings, Regulators provided periodic updates on remediation progress, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Notification and offering of identity theft protection services, Offered 24 months of free credit monitoring (TransUnion myTrueIdentity) and Eligible customers automatically enrolled; no claim filing requiredDirect deposits or checks issued post-approval (early 2026)Warning against phishing scams impersonating settlement administrators.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Misconfigured AWS Web Application Firewall (WAF) and Misconfigured WAF.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was 2019-03 to 2019-07 (Thompson exploited vulnerability for months).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Misconfigured WAF, Inadequate cloud security controls (AWS S3 bucket misconfiguration)Lack of real-time monitoring for anomalous accessOver-reliance on third-party (AWS) without sufficient oversightMisleading marketing practices for 360 savings accounts (contributed to lawsuit).
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Implemented Lacework’s AI-driven anomaly detection, reducing false positives by 70% while halving response times., Overhauled cloud security posture (e.g., automated permission reviews)Launched customer compensation program ($425M settlement)Enhanced transparency in interest rate disclosuresExpanded cybersecurity team and incident response capabilities.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.