FBI investigation on Shionogi security incident reveals the involvement of a former employee

Lord Tennyson’s immortal words “Men may come and men may go, But I go on for ever” hold good universally. For IT enterprises, where the attrition rate is very high, these words have more relevance. Steady stream of personnel come in and another stream keeps going out.

When people leave the organization, does your enterprise have an effective ‘deprovisioning’ process in place to ensure that the former colleague will not continue to access the corporate network?

This question may sound trivial because as the saying goes ‘out of sight, out of mind’, most of the employees leaving the organization will not care to access the network of their old workplace. But, numerous security incidents across the globe prove that a handful of persons with malicious intent and disgruntled workers indeed try to wreak havoc on the business of their former employers.

The FBI has recently published the outcome of an investigation of a cyber-crime, in which a 37-year old techie gained unauthorized access to the network of his former employer,a New Jersey pharmaceutical company and deleted portions of its computer network and virtually crippled the operations of the organization for days together. It was a kind of revenge he was taking on his former employer!

Jason Cornish, 37, was an information technology employee at Shionogi, Inc., a United States subsidiary of a Japanese pharmaceutical company with operations in New Jersey and Georgia.

During September 2010, shortly after Cornish had resigned from Shionogi, the company announced layoffs that affected Cornish’s close friend. Annoyed Cornish decided to take revenge.

Cornish gained unauthorized access to Shionogi’s network from a public wi-fi network using administrative passwords to which he had access as an employee.

FBI investigation states:

“Once he accessed the server, Cornish took control of a piece of software that he had secretly installed on the server several weeks earlier.

Cornish then used the secretly installed software program to delete the contents of each of 15 “virtual hosts” on Shionogi’s computer network. These 15 virtual hosts (subdivisions on a computer designed to make it function like several computers) housed the equivalent of 88 different computer servers. Cornish used his familiarity with Shionogi’s network to identify each of these virtual hosts by name or by its corresponding Internet Protocol address.

The deleted servers housed most of Shionogi’s American computer infrastructure, including the company’s e mail and Blackberry servers, its order tracking system, and its financial management software. The attack effectively froze Shionogi’s operations for a number of days, leaving company employees unable to ship product, cut checks, or communicate by e-mail. Shionogi sustained at least $300,000 in losses responding to the attack, conducting damage assessments, and restoring the company’s network to its prior condition.”  (Full Report …)

The FBI’s investigation revealed that the attack originated from a computer connected to the wireless network of a Smyra McDonald’s where Cornish had used his credit card to make a purchase minutes before the attack. Later, he was arrested and federally charged.

This security incident is a classic example for the kind of insider threats IT enterprises are prone to. A single disgruntled employee leaving the organization can wreak havoc to the very business, if user deprovisioning is not handled properly.

This requires a careful review of the access permissions granted to the employee, when he leaves the organization. The access has to be terminated and administrative passwords must be reset. Administrative passwords have to be reset at frequent intervals.

But, carrying out this task manually is cumbersome, time-consuming and error-prone. Automating the entire life-cycle of previleged password management is the key.

With an automated solution like Password Manager Pro, you can grant and terminate access to privileged passwords anytime on need basis. When an administrator leaves the organization, you can terminate access in minutes and also automatically reset the passwords, thereby avoiding these kinds of security incidents.

A secure vault for storing and managing shared administrative passwords and digital identities, Password Manager Pro helps eliminate password fatigue and security lapses, achieve preventive and detective security controls, meet security audits and improve IT productivity.

With insider threats looming large, taking preventive action is the need of the hour. Use Password Manager Pro and Stay Secure! 

Bala
ManageEngine Password Manager Pro

Quick Video | Free Trial DownloadWhite Papers  | Success Stories