By Alexey Drozd, head of the information security department, SearchInform.
The amount of news telling about employees taking revenge on their former employers seems to increase: "Sysadmin took revenge by destroying data and changing passwords", "Employee hacked the flight control system and allowed broken airplanes into the sky to take revenge on her former employer”.
But how can an employee take revenge?
Employees usually take revenge for ordinary things that they consider unfair: fines, payment disagreement, refusal to promotion, or dismissal. More than that, they can do it not just for themselves! "Vendetta" is also declared for unfair (in their opinion) treatment of their friends or relatives.
For example, Florida case: a woman resigned from Melbourne Flight Training school after the CEO fired her father. Along with her dismissal, she deleted certain data in the Flight Circle app featuring technical characteristics of airplanes and malfunctions list which was used to control and track the aircraft.
In our practice, there are also a bunch of gripping stories of employee revenge. Most often they try to harm companies by targeting:
Theft or damage of tangible assets
This problem is as old as time. I'm sure every business has a story about how a fired employee took something from work. It is good if it was a mug from the table. Often it turns out to be a working laptop or other equipment.
Draining, deleting, or encrypting confidential information
Sabotage in the "material" world requires some courage (everyone understands that it’s a crime), at the same time it becomes easier to take revenge with the help of information technology. Therefore, I want to dwell on this point in more detail.
Having access to confidential data, a fired employee can intentionally transfer it to competitors, thereby killing two birds with one stone: take revenge and receive a fee. Experience has shown, competitors are usually interested in a wide range of sensitive corporate information, starting with lists of current customers, ending with business plans, technological developments, and sometimes even passwords from corporate network resources.
More than that, ex-employees are not just potential causes of data breaches they can also delete critical information.
In the USA, a former IT administrator who worked at a medical center, 4 days after his dismissal, connected to the organization's network and deleted all accounts of medical center employees and documents from the center's file server. At the end of this “revenge mission”, the employees of the medical center were unable to log in to their accounts and lost access to patient files necessary for operations.
Unfortunately, illegal actions with information often go unpunished, which makes it easier for employees to commit such crimes in comparison with theft or damage to property. Last year we surveyed companies of various economic profiles, according to the survey only 12% bring the case to the court, most often the incident is solved by dismissal (in 50% of cases). Nevertheless, if an employee has already been fired, it will not frighten him in any way.
Harming the reputation of the company or slandering the boss
Employees may try to harm the image of the manager. Such attempts can be terribly ridiculous, but they should not be underestimated.
A former employee "registered" a former boss on several dating sites. He exposed his boss's personal data, including first name, last name, phone number, place of work, and did not forget to attach a photo. More than that, a former employee posted information about his boss’s non-traditional sexual orientation, attaching photos and videos allegedly confirming this.
How to carry out prevention measures
No company is immune from employee revenge. But it is possible- to reduce negative consequences of the incidents committed by the "avengers".
Here is a list of measures that enhance the security of the organization:
The success of an employee’s "vengeful operation" depends on company’s protecting its infrastructure.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!