A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer's computer systems.
Casey K Umetsu, of Honolulu, Hawaii, has pleaded guilty to charges that he deliberately misdirected a financial company's email traffic and prevented customers from reaching its website in a failed attempt to convince the firm to rehire him at a greater salary.
Umetsu, who had been employed in the IT division of the prominent Hawaii-based company between 2017 and 2019, admitted to the court that he had used his former employer's credentials to access its domain registrar, and deliberately changed the firm's DNS records to misdirect the business's web and email traffic.
As the Department of Justice describes, Umetsu additionally locked the company out of its domain name registrar account, preventing them from undoing the damage, for several days.
Of course, Umetsu could have easily undone the damage at any time - but from the sound of things he was waiting for his former employer to beg him to help him, and offer him a larger salary than he had previously enjoyed.
Instead, the company chose to contact the FBI.
"Umetsu criminally abused the special access privileges given to him by his employer to disrupt its network operations for personal gain,” said US Attorney Clare E. Connors. “Those who compromise the security of a computer network – whether government, business, or personal – will be investigated and prosecuted, including technology personnel whose access was granted by the victim."
From the sound of things, the problem here is simple to understand - but all-too-common in many work environments: when someone leaves your employment you should ensure that any passwords they have previously had access to no longer work.
Even if someone quits the firm on good terms, don't make the mistake of forgetting to wipe their login credentials, and any others to which they might have been privy.
Whether a disgruntled former employee is locking an entire city out of its network, deliberately planting malware, or replacing the CEO’s presentation with porn, the consequences can be serious.
Casey Umetsu is scheduled to be sentenced on January 19 2023. Under sentencing guidelines, he faces a spell of up to 10 years in prison, a maximum fine of $250,000, and up to three years of supervised release.
After that, it's quite possible no-one will ever trust him again to administer their IT network, or with the passwords to a key part of their infrastructure.
Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc
Meet Fortra™ Your Cybersecurity Ally™
Fortra is creating a simpler, stronger, and more straightforward future for cybersecurity by offering a portfolio of integrated and scalable solutions. Learn more about how Fortra’s portfolio of solutions can benefit your business.