Study: Insider revenge often behind cyberattacks

Companies hoping to mitigate their exposure to insider attacks need to ensure they have good password, account and configuration management practices, as well as the right processes in place for disabling network access when employees are terminated.

Also crucial are the need to have formal processes for handling employee grievances and negative events in the workplace as well as for reporting suspicious behavior, according to a report released this week by the U.S. Secret Service and Carnegie Mellon University's CERT coordination center.

The report is based on an investigation of 49 cases of insider attacks via computer systems in critical infrastructure sectors between 1996 and 2002, In a majority of cases, the primary motivation for the attacks appears to have been revenge, said Matt Doherty, special agent in charge of the Secret Service's National Threat Assessment Center.

"In 92 percent of the cases, a negative work-related event triggered the insider action," he said.

The good news for companies is that most of the attacks were planned and not impulsive acts, which are "very hard to prevent" he said.

A key finding of the study was that a majority of the incidents involved former employees who shouldn't have been able to access the systems after they left the company they worked for, Doherty said.

The majority of the cases didn't involve sophisticated attack tools. Rather, they occurred because organizations "neglected to disable access upon termination," he said.

The study also highlighted the need for organizations to be particularly diligent when terminating systems administrators and other privileged users such as database administrators, said Dawn Cappelli, a senior member of the technical staff at CERT. A full 57 percent of the attacks were carried out by systems administrators, while 33 percent were caused by privileged users, she said.

"We found that because these users were technically sophisticated they were able to find the one gap that the organization missed," she said.

Many attacks involved the use of so-called logic bombs that were designed to corrupt data and delete files after a specified period of time. In one case, a logic bomb went off more than six months after the person involved had been terminated, she said.

"The most significant damage cost US$10 million in damages and resulted in the layoff of over 80 employees," she said. That attack involved a systems administrator at a defense manufacturing firm who deleted the only copy of the software supporting core manufacturing processes. The attack came in retribution for being terminated.

The key to mitigating exposure to such attacks is to know what to look for, Cappelli said. Good configuration management practices allow companies to identify unauthorized changes to software that could indicate the presence logic bombs, for instance, she said.

Similarly, the creation of unauthorized remote access accounts by systems administrators and other privileged users could be an indicator of trouble to come, she said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jaikumar Vijayan

Computerworld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?