1 min read

Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials

Silviu STAHIE

September 30, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials

A Honolulu man pleaded guilty to sabotaging his former employee's network by using his credentials to create havoc after he was terminated from the company.

Sanitizing credentials for former employees needs to take place immediately after severing working relations. Companies that do not prioritize these types of security measures can end up paying a hefty price, just like the one in Hawaii.

Casey K. Umetsu, of Honolulu, Hawaii, worked for a financial company between 2017 and 2019 as an information technology professional. He had multiple responsibilities that allowed him access to all kinds of sensitive credentials. After the company severed working relations with Umetsu, he decided to take revenge.

"As part of his guilty plea, Umetsu admitted that, shortly after severing all ties with the company, he accessed a website the company used to manage its internet domain," saidthe US Attorney's Office for the District of Hawaii.

"After using his former employer's credentials to access the company's configuration settings on that website, Umetsu made numerous changes, including purposefully misdirecting web and email traffic to computers unaffiliated with the company, thereby incapacitating the company's web presence and email. Umetsu then prolonged the outage for several days by taking a variety of steps to keep the company locked out of the website," the US attorney added.

Umetsu's goal was to persuade the company to hire him back with a higher wage. His plan backfired when the company contacted the FBI, and he was arrested.

According to the prosecutors, Umetsu faces 10 years in prison, a fine of up to $250,000, and a term of supervised release of up to three years. The sentencing was set for January 19, 2023.

tags


Author



Right now

Top posts

How to monitor your online privacy during your Thanksgiving trip

How to monitor your online privacy during your Thanksgiving trip

November 22, 2022

3 min read
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

November 16, 2022

6 min read
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

November 14, 2022

5 min read
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Some Phone Manufacturers Didn't Implement Vital Security Patch for ARM Mali GPU, Google Researchers Find Some Phone Manufacturers Didn't Implement Vital Security Patch for ARM Mali GPU, Google Researchers Find
Silviu STAHIE

November 29, 2022

1 min read
Apple Users Report Seeing Other People's Photos When Using iCloud for Windows Apple Users Report Seeing Other People's Photos When Using iCloud for Windows
Silviu STAHIE

November 25, 2022

1 min read
How SIM Swapping Attacks Work and How to Protect Yourself How SIM Swapping Attacks Work and How to Protect Yourself
Filip TRUȚĂ

November 25, 2022

3 min read