Readit News logoReadit News
ksd482 · 2 years ago
IT also failed to put enough checks here. The article states that the employee still had a valid company account that he could use to access the repos.

The access should have been cut off right away.

sonicanatidae · 2 years ago
There is a symbiotic relationship between HR and IT.

In my orgs, when HR TELLS US, in advance, we nuke the creds while they are discussing the term with HR. If HR doesn't tell us, then we have zero way of knowing to kill their account.

When they don't tell us, then termed users continue to have access... again... because we have no way of knowing to term the access.

FirmwareBurner · 2 years ago
Naturally, that sounds on point for every company everywhere.

Though I've heard it's quite common in large enterprises that are fragmented due to a lot of aqui-hires, for corporate HR to forget or miss people they supposed to fire and who still remain on the payroll, especially on the satelite offices where there's no on-prem HR and nobody really knows what's going on from central.

A friend of mine was theoretically fired along with his entire team but just not him because corporate HR forgot about him or something, so he still showed up at the office without his team and without any work to do, badged in and played videogames all day for almost a year while getting paid in full, until some other people started asking "hey, who's is this guy and what does he actually do here all by himself?", then they actually fired him, or more like paid him a generous severance package to leave voluntarily in silence and not tell anyone about HR's blunder.

Lucky bastard.

r00fus · 2 years ago
Modern IT integrations connect the HR system to the IT to auto-provision (ie, hire) and auto-deprovision (ie, terminate) user access in near-real-time. In this case, once the termination is completed (& approved) in the HR system, the user loses access immediately without any IT involvement.

Here's an example of how Microsoft supports auto-provisioning from SAP Successfactors for this: https://learn.microsoft.com/en-us/entra/identity/saas-apps/s...

jcpham2 · 2 years ago
Yeah I have the same (symbiotic) lack of symbiosis relationship with HR so I run scripts and other automated tasks every so often to verify all the employees are actually using the accounts. Sometimes new people get hired and have to wait because HR cannot follow the simple instructions I ask for. Like a person's name typed out and emailed to me.
Volundr · 2 years ago
Don't underestimate a dumb managers influence on this. Back when I was running an orgs IT we had a similar incident when we fired an employee. HR had given us the heads up when it would happen, and we had someone standing by to kill their credentials (as the meeting started someone would give the final go ahead). Their manager however decided to "get it over with" without telling us, then when said employee asked if they could get some information off their work computer, proceeded to sit with them while they attempted to delete all their work.

I was able to recover it from OneDrives second recycle bin so nothing was lost, but I was livid. This employee was literally being fired because they were refusing to train anyone else on their work for "job security purposes", it's not like we didn't have warning this wouldn't be graceful.

gamblor956 · 2 years ago
At my last job, most of the company was laid off during the early part of the COVID lockdowns.

...Including the IT guy who was responsible for killing everyone's access credentials...

All of us that were laid off watched the company-wide zoom where the CEO tried to blame everyone who had been laid off as dead weight. They managed to get the other IT guy to kill our credentials the following week.

Then they laid the other IT guy off before anybody had sent in their work laptops or other work equipment because the CEO decided that if the offices were going to be closed indefinitely we didn't need an IT guy. The company had to write off more than $1 million in assets that were never returned, including a number of very expensive, very new RED cameras.

A lot of times, IT's "failures" are just the failures of management.

Deleted Comment

mistrial9 · 2 years ago
zero-trust works both ways
next_xibalba · 2 years ago
I believe this line of thought is commonly called “blaming the victim”.
capableweb · 2 years ago
No, blaming the victim would have been:

> The only reason this happened was because they failed to secure their own systems, it was bound to happen

Instead, parent said:

> IT also failed to put enough checks here

My emphasis on the "also".

pierat · 2 years ago
Sometimes, the victim is *also* to blame.

When shitty policies are part of the root cause, then yes, the victim also shares in creating an environment that allowed easy victimization.

You wouldn't secure your laptop in the front seat of a car in NYC or Chicago. Just as you are not to blame with the vandalization and theft of said equipment, you also could have did easy mitigations to hamper it.

People who shout "victim blaming" are also refusing to take responsibility for reasonable remediations that would have prevented the bad thing.

bitwize · 2 years ago
It's totally legitimate to simultaneously hold that the real perpetrator is, er, the perpetrator, and that the victim could have done more to prevent the incident from happening.

Jail the guy, and let his story stand as a warning to implement proper IT and HR practices.

acdha · 2 years ago
Nobody is excusing him but it’s possible for multiple people to make very bad decisions as part of the same problem. In this case, the bank has almost certainly claimed to have security policies in place which would have prevented any of the damages in question. I don’t even work in banking but “how do you deactivate accounts when someone leaves?” is in every single system’s approval process and ongoing audits.

Think of it as if he had stolen money from them after being fired: there’s no question that the culpability would be his but also regulators and insurance would descend on the bank’s management asking why they lacked such basic internal controls for such very well-known risks. Most places will remove all forms of access as soon as the decision is made to fire someone because it’s the most likely time to have anything from theft to, in the US, a workplace shooting.

foobarbaz333 · 2 years ago
There are compliance regulations that require this btw.
plasmatix · 2 years ago
I mean, if someone dies in a car crash and they weren’t wearing their seat belt, is it victim blaming to say they should have been?
tamimio · 2 years ago
I think the big chunk of the penalty is because he lied to the secret service agents rather than the company damage, that being said, why would the secret service investigate a private sector company incident? At most, it should be the FBI afaik
dragonwriter · 2 years ago
> why would the secret service investigate a private sector company incident? At most, it should be the FBI afaik

The Secret Service started out as an anti-counterfeiting service, expanded into VIP protection, general national financial system security, and for a while general cybercrime, though the latter (outside of where it touched on the other Secret Sevice functions) fell away.

“We also protect the integrity of our currency and investigate crimes against the U.S. financial system committed by criminals around the world and in cyberspace.” https://www.secretservice.gov/about/overview

Aurornis · 2 years ago
Lying to federal agents to cover up a crime is definitely a big part of the penalty. He got caught and kept digging himself into more crimes.

I’m also surprised the secret service was involved. I wonder if they suspected foreign involvement or considered it a matter of national security because it was an attack on banking infrastructure?

acdha · 2 years ago
The USSS started as the Treasury Department’s anti-counterfeiting enforcement agency and only later expanded into protecting lawmakers. They still have a mission to protect the financial systems of the United States and I’d imagine anything involving bank IT integrity involves a call for them.
ja27 · 2 years ago
On the federal sentencing guidelines, the base offense level for that is 6 (0-6 months), which is way lower than the fraud's level would end up given the dollar amount.
Projectiboga · 2 years ago
The Secret Service also does anything with hacking the telecom system, wired and wireless and it looks like they also do some of the internet and infrastructure stuff.
yencabulator · 2 years ago
The ex-employer was a bank, that might change things. Also:

> impersonated other bank employees by opening sessions in their names

oseityphelysiol · 2 years ago
I would wonder what would happen whenever I was frustrated and now I know, thanks. I'll look for a new intrusive thought to have as a coping mechanism.
charcircuit · 2 years ago
Deleting a github repo doesn't actually fully delete it though.

https://docs.github.com/en/repositories/creating-and-managin...

whalesalad · 2 years ago
You can cause mayhem by force pushing all refs as empty though. Then you would likely need to get GH support on the line to restore a backup, if they had them for you.
sbergot · 2 years ago
It is really easy to protect you main branch. Github will actually warn you if don't have any protection policy on it.
dvngnt_ · 2 years ago
I feel like at least one employ would have a clone of the repo no more than a few hours old.
telios · 2 years ago
But the commits will still be there even if the refs aren't, afaik? GitHub doesn't run gc that often.
hartator · 2 years ago
They probably use a custom solution. (Bank nonsense)
charcircuit · 2 years ago
The article said it was a github repo

>Accessed FRB's GitHub repository and deleted the hosted code

reactordev · 2 years ago
Probably Bitbucket...

Dead Comment

JCharante · 2 years ago
Why did he do it? I hate having access to things, it's just liability for you. I kept all my company passwords in my company password manager that was linked to my employee email so that if I lost my email access I would lose all passwords to anything company related. Whenever someone texts me a password I delete it after using it.
rdtsc · 2 years ago
> Inserted 'taunts' in the code, including references to "grok"

Did he get extra time for grok references? It’s just an odd thing they added to the list.

bitwize · 2 years ago
Reminds me of the furry who got fired from a company and used a backdoor into their web server to tamper with their site after the fact. Only he knew how the server actually worked because it was a custom server whose scripting language was the FurryMUCK extension language. He blogged about this casually on his LiveJournal like it was no big d. Very Dennis Nedry of him. Few years later he was involved in the Ginko Financial scam on Second Life.

Some men just want to watch the world burn.

gtroja · 2 years ago
Would love to rear that story
madamelic · 2 years ago
When will the FBI catch the notorious hacker grok?!

Ugh, it could be anyone of us!