Friday, January 24, 2025
HomeCloudCloud Engineer Sentenced for Deleting Ex-employer’s Code Repos & Logs

Cloud Engineer Sentenced for Deleting Ex-employer’s Code Repos & Logs

Published on

SIEM as a Service

Follow Us on Google News

San Francisco resident Miklos Daniel Brody, 38, took revenge on his former employer, a bank, by hacking valuable computer code and damaging the bank’s cloud system. And the Cloud Engineer Sentenced.

After stealing information from and purposefully damaging a protected computer, he was sentenced to 24 months in prison for breaking the Computer Fraud and Abuse Act. He was also found guilty of making false statements to a government agency.

Brody worked as a cloud engineer for a San Francisco-based First Republic Bank (FRB) until March 11, 2020, when he was fired for breaking corporate policy.

Brody Accessed the FRB’s Bank Computer Network

In the superseding indictment, it is claimed that Brody accessed the FRB’s computer network without permission and caused significant damage later that evening and early the next morning using his company-issued laptop, which he failed to return after being fired.

That evening, after breaking into FRB’s computer system, BRODY started executing scripts to delete code and harm the software infrastructure.

After using the VPN to get access to the FRB computer system, BRODY established a connection to the “Jumpbox,” the secured host server. 

The complaint claims that it allowed him to access the code repositories on “Devbox” and “Github.” Utilizing the “grand.sh” script concealed under a network information folder, he terminated nearly every instance within Amazon Web Services (AWS).

Additionally, he sent himself a proprietary bank code that he had worked on while employed; the code was worth more than $5,000. 

The DOJ claims that BRODY deleted the bank’s code repositories, erased logs containing malicious scripts, left taunts for former colleagues in the bank’s code, and initiated sessions under the identities of other bank workers.

Judge Orrick calculated the overall cost of the system damage to the bank to be at least $220,621.22 during the sentencing hearing.

The superseding indictment also claims that Brody committed several evasive and dishonest acts in the days and weeks that followed his termination, such as submitting a police report in which he lied to the San Francisco Police Department that his company-issued laptop had been stolen from his car while he was exercising at the gym.

Brody doubled down on that false allegation in statements he made to USSS agents during an interview following his arrest in March 2021.

Brody acknowledged making a false claim regarding the company-issued laptop in his guilty plea application, and he acknowledged that he was aware of the dishonesty of the claim at the time.

The Sentencing

Miklos Daniel Brody was given a 24-month prison term today for both hacking into a network and lying to a government organization.

Judge Orrick not only sentenced Brody to jail but also mandated that he pay $529,266.37 in restitution and serve three years of supervised release following his prison term.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations

The New York State Department of Financial Services (NYDFS) has imposed a $2 million...