Insider Threat: Former VP Goes Rogue
A former vice president of a Georgia company was recently put behind bars for sabotaging systems using bogus credentials after he was fired.
Analysts said the case serves as an example of the damage a disgruntled insider can wreak on a business—especially if the insider has some technical savvy.
Used bogus account
Christopher Dobbins once worked for Stradis Healthcare, a medical equipment packaging company that facilitates the delivery of PPE, supplies, and surgical kits. After being fired in March 2020, the 41-year-old accessed a secret, fake staff account he had created while still in Stradis’ employ. The ex-employee, described as disgruntled by the FBI, was then able to maintain secret access to the company’s systems, despite his legitimate account being revoked. Dobbins set about disrupting Stradis’ electronic records by creating a secondary user account, editing more than 115,000 records, and deleting more than 2,300 entries.
According to the FBI, the intrusion “disrupted the company’s shipping processes, causing delays in the delivery of much-needed PPEs to healthcare providers” who are trying to cope with the COVID-19 pandemic. And Dobbins’ actions did not just cause his former company’s operations to grind to a screeching halt in March; issues continued for months after, as Stradis sought to repair the damage. The FBI’s Atlanta Cyber Task Force was called in. Eventually, Dobbins was arrested. He pleaded guilty to multiple computer intrusion charges.
Dobbins will serve a year and a day behind bars and has been ordered to pay restitution to the tune of $221,200.
© National Security Institute, Inc. www.nsi.org
Recent SecuritySense Posts
- 5 Things Crooks Love to See In Your Social Media Profile
- FAQ: Security and the Cloud
- The Ransomware Perfect Storm
- Children More at Risk Online During Pandemic
- Going Back to the Office? You’re a Perfect Target for Phishers
- 5 New Social Engineering Tactics Criminals Are Using Right Now
- Frequency Strategy in Security Awareness Campaigns
- Security Awareness Email Is Not Spam
- April Scam Watch
- Top 4 Emotions Used in Social Engineering
Protect Yourself & Your Company From Cybercrime
Unique Content Strategy
People pay attention to content they find personally relevant. SecuritySense doesn’t feel like you’re being given extra work to do. It’s a blend of personal and work-relevant cybersecurity tips, warnings, human interest stories, instructions, news and insights that everyone looks forward to receiving. More about our content strategy
The Secret to Creating Awareness
Brand marketers know if you want to create awareness you have to do two things. Steadily promote your message and make sure that message offers content that personally resonates with your audience. SecuritySense makes it easy for you to do both.
Compare Our Per Employee Cost
Compare our per employee annual cost with the $8.00 – $20.00 seat licenses you might pay for training platforms. It’s a no-brainer to add SecuritySense to your overall program.