Skip to main content

Jun 2024

Cyber report spotlight: Ex-employee wipes 180 servers after being fired​ ​

An ex-employee in Singapore has been jailed for using their administrative access to wipe 180 servers, four months after leaving the company. ​

Categories

What happened​

In October 2022, a Cloud Consultant at National Computer Systems (NCS) in Singapore was fired, however his administrative access was not revoked.​

Upset with his termination, the employee left Singapore, but continued to access NCS’s systems six times between January 6th and 17th 2023, when he appears to be familiarising himself with the system, exploring possible vulnerabilities, and testing whether his activity would be detected. ​

In February 2023, the ex-employee returned to Singapore to start a new job, however continued to access NCS systems. They rented a room with a former NCS colleague in Singapore and used their Wi-Fi to login to the NCS network, therefore masking their activity with an employee’s legitimate logins. During this time, the ex-employee searched online for scripts that could be used to delete servers one by one.​

In March 2023, he launched the cyberattack on NCS, accessing the network and executing scripts, which deleted 180 virtual servers one by one. As the attack occurred over the weekend, the damage was only discovered by NCS on Monday the following week. The estimated cost of the incident and the recovery was over £500,000.​

​In June 2024, the ex-employee was sentenced to two years and eight months in prison for the cyberattack. ​

Wider implications​

While relatively uncommon compared to other types of cyberattacks, when malicious insider threats do occur the damage can often be extremely high due to the levels of access employees can possess. Using their extensive knowledge of the company’s infrastructure to identify weaknesses in both technology and processes employees are able to carry out damaging attacks. These types of attacks can be difficult to identify since they are usually by an individual working alone, who may not have shown any indication that they would carry out an attack prior to the incident.​

The focus for organisations should be on  minimising the potential impact of an insider threat as well as the time taken to identify any destructive attacks, by ensuring the principle of least privilege is applied to all administrative access, and that all actions are logged and can be traced back to a user account.​

To make sure you stay informed on all the latest cyber security news, sign up to our cyber report where we discuss all the latest news and give you insights into the best practises for protecting your data. 

Sign up here!

Cyber report spotlight: Ex-employee wipes 180 servers after being fired​ ​

An ex-employee in Singapore has been jailed for using their administrative access to wipe 180 servers, four months after leaving the company. ​

Cyber Report Spotlight: London Hospitals declare ‘critical incident’ following cyber attack

Following a cyberattack on a key supplier, several London hospitals declared a ‘critical incident’ as they lost the ability to carry out key patient services. ​

Billy Pickin
Written byBilly Pickin

Diving into the data pool: Navigating the upcoming O365 storage changes for higher education

The way that storage works across Microsoft O365 is changing significantly for all educational tenants from August 1st 2024 (upon contract renewal). Depending on your organisation’s usage,…