The sequence of events sounds like it was taken straight from a movie script. Five software programmers were working late into the night, chatting on their phones while they worked.
During the wee hours of October 9, between 1:00 am and 4:00 am, they managed to hack the company’s primary server and successfully gained access to sensitive customer data, which they then proceeded to steal.
The following day, all five software company employees in Chennai showed up to work in Bengaluru or Chennai, where they joined their coworkers in expressing their shock and horror at the loss of sensitive information belonging to five of the company’s most valuable clients.
The business owner had no idea what was happening as he saw his six years of hard work go down the drain. His workforce mostly defected.
Then he discovered that his US-based clients had been cut off because the operating system he used, Amazon Web Services (AWS), had changed their credentials. He tried to contact them but was met with silence.
StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.
He eventually went to the police in Chennai, India, about the cybercrime. The investigators followed the internet protocol address and other technical facts from where the server was accessed and gained a breakthrough within a few hours.
Cyber Security News learned from the local authorities that they narrowed it down to five people: two in Chennai and three in Bengaluru, all firm employees. Edison, 29, who was responsible for the company’s operations in Chennai, was the one who logged onto the server and began the theft. According to their findings, he participated in a conference call with four other people.
Using this information, they were able to track down his coworker in Chennai, Ramkumar, as well as three employees at the Bengaluru office: Kavya Vasanthkrishan, Ravitha Devasenapathy, and S Karuppaiah.
Police discovered that the five had formed a new software firm called “Blue Dawn” the day following the theft and had contacted the five victims, whose information had been taken, offering their services at a steep discount.
Australian cybercrime investigators are looking for a second software programmer who helped steal the data. They want to ask Interpol for assistance tracking him down and will issue a lookout circular.
Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…