[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Retiring worker tries hide theft of data with cyber attack, blames

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 4
Thread images: 1

File: 1472105568592.gif (2MB, 268x180px) Image search: [Google]
1472105568592.gif
2MB, 268x180px
http://news.softpedia.com/news/retiring-sysadmin-fakes-cyber-attack-to-get-away-with-data-theft-507992.shtml

>A system administrator for an unnamed company was caught defacing his own firm's website to hide the theft of company data, which he planned to sell and then retire to a seaside town abroad.

>The system administrator, who, due to non-disclosure agreements signed in such security incidents, cannot be named at this point in time, had worked for his company for 15 years and had earned the trust of his colleagues.

>The employee had always wanted to buy a house in a seaside town abroad when it was time to retire. Unfortunately, he wasn't able to gather all the money to follow through on his dreams.
>"Crooks approached the sysadmin to sell corporate data"

>As he was getting near retirement, the system administrator received an offer to sell corporate data, which would have allowed him to purchase the house of his dreams and retire as he always wanted.

>To mask the theft of his company's data, the system administrator engineered a plan to carry out a fake cyber-attack.

...
>>
>He excused himself one day from work and told fellow employees he was attending a security conference. In reality, the system administrator crossed the border into a neighboring country (a one-hour drive from his workplace), where he used a commercial vulnerability scanner to probe his company's network, just like it would happen in a real attack.
>"System administrator defaced his own website"

>When he came back to work the next day, he used his admin panel credentials to deface one of the company's websites with a message from a hacktivist group accusing the firm of globalization. He saved a copy of the defacement on the Zone-H mirroring site and erased all data from the web root folder, along with all the logs.

>He then reported the hack to his bosses claiming the company was attacked by known hackers and recommended that he wipe the server and reinstall everything to avoid a prolonged downtime.

>After he received approval and carried out a server clean-up, the sysadmin also contacted the company's web security provider, a Swiss-based company named High-Tech Bridge.

>When High-Tech's security team arrived to inspect the hacked server, they discovered a newly installed machine instead, with no clues about the attackers or the attack's origin.
>"Clues leave a trace back to the sysadmin"

>Unfortunately for the server admin, he didn't cover all his tracks. High-Tech Bridge investigators were quick to point out a series of discrepancies.

>For example, anyone who has ever met a hacktivist knows that they're all about media coverage and publicity stunts. There was no trace on social media about this hack.

>Investigators also pointed out that the target of the defacement was a well-protected subdomain on a less used server, which makes no sense since the company was managing several highly trafficked websites that ran older software, which were much easier to hack from an attacker's perspective.

...
>>
>Unknown to all at that time was the fact that the system administrator chose to deface that website because the data he was told to steal was stored on that less trafficked server.
>"Hacktivists can't afford enterprise-grade vulnerability scanners"

>Additionally, the attack was carried out from an IP belonging to a public Wi-Fi network, something that also doesn't fit the hacktivist attack model because these groups use Tor in almost 99.99% of all cases to hide their location.

>Furthermore, the security scanner the system administrator used to search for vulnerabilities was a very expensive tool, which very few hacktivists could afford, and one for which the company held a few licenses.

>"[T]he defacement was definitely done via existing functionality of the admin panel, without altering file content directly via a system command," Ilia Kolochenko, High-Tech Bridge CSO, explains.

>Since access to the admin panel was only limited to a select IP range, assigned to computers inside the company, this meant the login took place from behind the company's firewall, in other words, this was the work of an insider.

>Add to this the fact that the system administrator insisted for a server reinstallation, against all security breach procedures, meant the sysadmin had something to gain by erasing that server. All of these clues placed the sysadmin at the top of the main suspects list.

>Confronted with all the details gathered by the High-Tech Bridge team, the system administrator admitted to his wrongdoing.
>>
>>72143
Psssht, n00b
Thread posts: 4
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.