Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Ex-Cisco Staff Member Sent to Prison for Erasing 16k Webex Accounts!

Ex-Cisco Staff Member Sent to Prison for Erasing 16k Webex Accounts!

A man has been sentenced to 2 years in prison in the US after being convicted of hacking Cisco’s Webex collaboration platform in an insider-threat case brought in the US District Court in California.

Sudhish Kasaba Ramesh, 31, admitted that he broke into Cisco’s cloud infrastructure in 2018, hosted on Amazon Web Services, about 4 months after he resigned from the company.

Then, he said in his plea agreement, he deployed a code from his Google Cloud Project account, which automatically deleted 456 virtual machines that host the WebEx Teams application.

2 Weeks

As a result, 16,000 WebEx Teams accounts were shut down for up to 2 weeks &, the incident cost Cisco about $1.4m in remediation costs, including refunding $1m to affected customers, according to a court announcement.

The defendant was further sentenced to serve a 1-year period of supervised release following his time in prison. In addition to jail, the court ordered Ramesh to pay a $15k fine for ‘intentionally accessing a protected computer without authorisation’ & ‘recklessly causing damage to Cisco.’

He will begin serving the sentence on Feb. 10, 2021.

Access

It is unclear why Ramesh caused the attack, or how he was able to access Cisco’s infrastructure after he was no longer working for them.

Insider threats – be they disgruntled former employees, rogue employees or clueless workers who accidentally create risk – are an ongoing top danger for companies. Often, employees are groomed by outsiders. Says a 2019 study from OpenText, between 25-30% of data breaches involved an external actor working with an internal person in an organisation.

Blackmail

“We used to focus on external threat actors, but now, when compromising the network, many have someone on the inside, whether it’s because they bribed them or blackmailed them,” Paul Shomo, Senior Security Architect with OpenText, suggested at the time.

The insider-threat issue has been exacerbated by the transition to remote work. In the past, insider threats from employees & others given access to the network were more easily monitored because they were inside the network perimeter, & so malicious activity could be more easily detected.

Restricting Access

“Even while employees continue to work from home, they still require access to corporate assets to do their jobs well,” commented Justin Jett, Director of Compliance & Audit at Plixer.

“Without access, some employees can’t perform their duties at all. Organisations must define long-term policies for how employees access company-owned assets, especially if they intend to allow employees to work from home indefinitely.

Such policies should include restricting access by role, as well as other security measures like requiring employees to be connected to the corporate VPN.”

https://www.cybernewsgroup.co.uk/virtual-conference-january-2021/

 

SHARE ARTICLE