Task 1 of 5

Real Breach: Capital One — 100 Million Records via SSRF

## How One Cloud Misconfiguration + SSRF Cost $80 Million In 2019, Capital One suffered one of the largest financial data breaches in US history. The attacker: a former AWS engineer. The method: **SSRF against the cloud metadata service**. Capital One ran a web application firewall (WAF) on AWS. The WAF had a misconfigured permission that allowed it to make outbound HTTP requests. The attacker sent a specially crafted request that caused the WAF to fetch: `http://169.254.169.254/latest/meta-data/iam/security-credentials/` That IP — 169.254.169.254 — is the AWS instance metadata service. It's only reachable from inside the cloud instance itself. Normal users on the internet can't touch it. But the server-side WAF could. The metadata endpoint handed back **temporary AWS credentials** with admin-level permissions. With those credentials, the attacker downloaded 106 million customer records: names, Social Security numbers, credit scores, bank account numbers. **Total cost: $80 million in fines plus $190 million in settlements.** --- ### Why SSRF Is So Dangerous in the Cloud Every major cloud provider has a metadata endpoint reachable via SSRF: | Provider | Metadata URL | |---|---| | AWS | `http://169.254.169.254/latest/meta-data/` | | Google Cloud | `http://metadata.google.internal/` | | Azure | `http://169.254.169.254/metadata/instance` | If an app running in the cloud can be tricked into fetching these URLs, the attacker receives cloud credentials, instance details, and sometimes user data — all from a single request. This is why SSRF jumped to the OWASP Top 10 in 2021 (it wasn't even on the list before). Cloud adoption made it catastrophic.