Paige Thompson mined cryptocurrency on Capital One's cloud servers and hacked more than 30 companies - indictment

clock • 2 min read

Freshly unsealed indictment claims that Thompson developed her own scanning tool to identify cloud computing accounts' misconfigured firewalls

Paige Thompson, the alleged hacker behind the Capital One compromise, used the companies hacked servers to mine cryptocurrency. She is also accused of penetrating the security of more than 30 other...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
AI to transform software developer roles at AWS, CEO predicts

Skills

Coders may have to learn other skills says Matt Garman

clock 23 August 2024 • 3 min read
Breaking tech monopolies: Preventing the overreach of big tech giants

Cloud Computing

Dangers of dependence on a handful of powerful tech companies

clock 21 August 2024 • 4 min read
UK and India announce joint Technology Security Initiative

Government

Countries say the new initiative to drive economic growth, create jobs and strengthen the bilateral relationship

clock 26 July 2024 • 3 min read
Most read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read