Saturday, November 16, 2024
Homecyber securityGang of 5 Employees Stole The Customer Data at Late Night in...

Gang of 5 Employees Stole The Customer Data at Late Night in Office

Published on

The sequence of events sounds like it was taken straight from a movie script. Five software programmers were working late into the night, chatting on their phones while they worked.

During the wee hours of October 9, between 1:00 am and 4:00 am, they managed to hack the company’s primary server and successfully gained access to sensitive customer data, which they then proceeded to steal.

The following day, all five software company employees in Chennai showed up to work in Bengaluru or Chennai, where they joined their coworkers in expressing their shock and horror at the loss of sensitive information belonging to five of the company’s most valuable clients.

- Advertisement - SIEM as a Service

The business owner had no idea what was happening as he saw his six years of hard work go down the drain. His workforce mostly defected. 

Then he discovered that his US-based clients had been cut off because the operating system he used, Amazon Web Services (AWS), had changed their credentials. He tried to contact them but was met with silence.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

He eventually went to the police in Chennai, India, about the cybercrime. The investigators followed the internet protocol address and other technical facts from where the server was accessed and gained a breakthrough within a few hours. 

Cyber Security News learned from the local authorities that they narrowed it down to five people: two in Chennai and three in Bengaluru, all firm employees. Edison, 29, who was responsible for the company’s operations in Chennai, was the one who logged onto the server and began the theft. According to their findings, he participated in a conference call with four other people.

Using this information, they were able to track down his coworker in Chennai, Ramkumar, as well as three employees at the Bengaluru office: Kavya Vasanthkrishan, Ravitha Devasenapathy, and S Karuppaiah.

Police discovered that the five had formed a new software firm called “Blue Dawn” the day following the theft and had contacted the five victims, whose information had been taken, offering their services at a steep discount.

Australian cybercrime investigators are looking for a second software programmer who helped steal the data. They want to ask Interpol for assistance tracking him down and will issue a lookout circular.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...