Speaking of burning bridges....

Hyperblaze

Lifer
May 31, 2001
10,027
1
81
Before You Fire the Company Geek...

If you notice a fellow employee suddenly freaking out or acting really suspicious, he may be having personal problems -- or he may be in the process of hacking the company. So says a new study on "insider threats" released Monday by the U.S. Secret Service and the Carnegie Mellon Software Engineering Institute's CERT (that used to stand for Computer Emergency Response Team, but now they just call it CERT).

The study examined 49 insider attacks, carried out between 1996 and 2002, where disgruntled employees took advantage of their access to the company's network and computer resources to destroy data or embarrass fellow employees or their employer. The study focused less on the incidence of hacking committed by trusted employees than on the motivation of insider hackers and the circumstances that allowed them to inflict damage on the affected companies. As such, it includes some interesting anecdotes, but also a lot of "no duh" findings.

For example of the latter, the study's "executive summary" notes that in 62 percent of the cases, "a negative work-related event triggered most of the insiders' actions." The study also found that 82 percent of the time the people who hacked their company "exhibited unusual behavior in the workplace prior to carrying out their activities." The survey surmises that's probably because the insiders were angry at someone they worked with or for: 84 percent of attacks were motivated by a desire to seek revenge, and in 85 percent of the cases the insider had a documented grievance against their employer or a co-worker.

Part of that "unusual behavior" was no doubt a result of the employee trying to hit "alt-tab" fast enough to hide their screen when the boss walks by. In 27% of the cases, "the overt behaviors were technical actions taken to set up the attack, including constructing and testing a logic bomb on the network, centralizing critical assets and sabotaging backups, or installing backdoors." For the uninitiated, a "logic bomb" is a destructive computer program -- like a virus -- designed to go off at a time predetermined by the attacker, usually after said attacker is no longer employed by the target. A "backdoor" is a simple program that allows the attacker to secretly gain access to the company's network, even if the credentials given to them by their employer to access the network have been revoked.

To get to the more interesting findings, forget the executive summary and the 10 pages of methodology and check out some of the real-life anecdotes upon which the report was based. For instance:

"A system administrator, angered by his diminished role in a thriving defense manufacturing firm whose computer network he alone had developed and managed, centralized the software that supported the company's manufacturing processes on a single server, and then intimidated a coworker into giving him the only backup tapes for that software. Following the system administrator's termination for inappropriate and abusive treatment of his coworkers, a logic bomb previously planted by the insider detonated, deleting the only remaining copy of the critical software from the company's server. The company estimated the cost of damage in excess of $10 million, which led to the layoff of some 80 employees."

As it turns out, the report's title is a bit of a misnomer: In almost 60 percent of the time, the attacks were launched by contractors or people who had recently been fired (48 percent). Eighty-six percent of insiders were techie types, including system administrators, programmers, engineers and IT specialists. What lessons can we take away from this? According to the report, if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers.

Some other interesting (although not particularly surprising) tidbits: Almost all -- 96 percent -- of the insiders were men, and 30 percent of them had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-financial-fraud related theft offenses (11 percent.

Now the good news: almost all of them got caught. Ninety percent of the insiders faced formal criminal charges, and 61 percent of those charged faced penalties under federal law. Eight-three percent of those charged were convicted, and another 5 percent didn't contest the charges.

edit: woops, forgot to link. http://blogs.washingtonpost.com/securityfix/2005/05/employees_takin.html

Real life cases
 

yukichigai

Diamond Member
Apr 23, 2003
6,404
0
76
My dad likes to use me as sort of an unpaid consultant for his company. (Which is fine by me; the folks still shell out money for my insurance and a few other things while I'm in school so it's more than fair) He couldn't believe the protective measures I suggested when he mentioned he was going to fire their network admin. I was a little surprised at first, but it makes sense; people don't realize how destructive one person with a few passwords can be.
 

Vette73

Lifer
Jul 5, 2000
21,503
9
0
Well I think most are bad. BUT how many people are probable in the right when they did all the work, upper boss takes credit and gets bonus, and you end up training your replacment.
Sorry but treat your employees like sh1t and that will happen. Now most are just soem snotty idiot, but some to me seem fair. :evil: Not that I would/have done anything like that ;)
 

91TTZ

Lifer
Jan 31, 2005
14,374
1
0
"In 27% of the cases, "the overt behaviors were technical actions taken to set up the attack, including constructing and testing a logic bomb on the network, centralizing critical assets and sabotaging backups, or installing backdoors."

I'm 93.8% sure that the US government needs to quit being so paranoid and pull its head out of its a$$.
 

sixone

Lifer
May 3, 2004
25,030
5
61
Logic bomb - now that's intriguing. Good thing I didn't know such a thing existed with a former employer...
 

DrPizza

Administrator Elite Member Goat Whisperer
Mar 5, 2001
49,601
167
111
www.slatebrookfarm.com
In court:
"no, when they fired me, they forgot to have someone replace one of the most important tasks I had to do on a bi-weekly basis."
"and what task is that?"
"there was a program on the network which would cause irreparable harm at a specific date. One of the duties I took on myself was to advance the date by 2 weeks every other week."
"why did you do that?"
"well, when I wrote, err, uhh, when I tried to advance it more than 2 weeks, it wouldn't let me. So, I could only advance it 2 weeks at a time."
"why didn't you just delete it?"
"NOW you suggest that. I never thought of that."
 

GeekDrew

Diamond Member
Jun 7, 2000
9,099
19
81
Originally posted by: Biggerhammer
I'll admit that I thought fondly about wandering through the server room with a stun gun at one job :)

I've *thought* about much worse than that.

Unfortunately, the fear of being caught is what stops me.
 

mchammer

Diamond Member
Dec 7, 2000
3,152
0
76
Originally posted by: Marlin1975
Well I think most are bad. BUT how many people are probable in the right when they did all the work, upper boss takes credit and gets bonus, and you end up training your replacment.
Sorry but treat your employees like sh1t and that will happen. Now most are just soem snotty idiot, but some to me seem fair. :evil: Not that I would/have done anything like that ;)

Yea but they could just do something humorous then. Causing people to get fired = :thumbsdown: