Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Crime Cloud

Cloud Engineer Gets 2 Years For Wiping Ex-Employer's Code Repos (bleepingcomputer.com) 121

Bill Toulas reports via BleepingComputer: Miklos Daniel Brody, a cloud engineer, was sentenced to two years in prison and a restitution of $529,000 for wiping the code repositories of his former employer in retaliation for being fired by the company. According to the U.S. Department of Justice (DoJ) announcement, Brody was fired on March 11, 2020, from First Republic Bank (FRB) in San Francisco, where he worked as a cloud engineer. The court documents state that Brody's employment was terminated after he violated company policies by connecting a USB drive containing pornography to company computers.

Following his dismissal, Brody allegedly refused to return his work laptop and instead used his still-valid account to access the bank's computer network and cause damages estimated to be above $220,000. "Among other things, Brody deleted the bank's code repositories, ran a malicious script to delete logs, left taunts within the bank's code for former colleagues, and impersonated other bank employees by opening sessions in their names," describes the U.S. DOJ announcement. "He also emailed himself proprietary bank code that he had worked on as an employee, which was valued at over $5,000."

After the incident, Brody falsely reported to the San Francisco Police Department that the FRB-issued laptop had been stolen from his car. He continued to uphold this story when interviewed by United States Secret Service agents following his arrest in March 2021. Eventually, in April 2023, Brody pleaded guilty to lying about the laptop and to two charges concerning violation of the Computer Fraud and Abuse Act. In addition to the two-year prison term and the payment of the restitution, Brody will serve three years of supervised release.

This discussion has been archived. No new comments can be posted.

Cloud Engineer Gets 2 Years For Wiping Ex-Employer's Code Repos

Comments Filter:
  • by LazarusQLong ( 5486838 ) on Tuesday December 12, 2023 @05:25PM (#64077151)
    that if you're going to fire someone in IT, then you must disable their access FIRST? Perhaps having an error screen come up so they don't know their access has been cancelled?
    • Re: (Score:2, Interesting)

      by Anonymous Coward

      If you need to do this then you hire the wrong people. Fire your managers and HR department too.

    • by ShanghaiBill ( 739463 ) on Tuesday December 12, 2023 @05:50PM (#64077223)

      that if you're going to fire someone in IT, then you must disable their access FIRST?

      Sure, but that doesn't change the culpability of the perp.

      It's not okay to rob someone's house just because they fail to lock the door.

      • This is true of course, but people get emotional, a bit like road rage, but behind a screen. You can do a lot of damage at a keyboard.

      • by Tyr07 ( 8900565 )

        Sure, but that doesn't change the culpability of the perp.

        Sure, but it doesn't change the fact that companies should be following standard IT practices to prevent this from happening in the first place.

      • by mjwx ( 966435 )

        that if you're going to fire someone in IT, then you must disable their access FIRST?

        Sure, but that doesn't change the culpability of the perp.

        It's not okay to rob someone's house just because they fail to lock the door.

        It also doesn't cover you for any dead man switches they left under shared accounts or secret accounts set up that no-one else knows about. If I were ever to try to sabotage my employer I sure as hell wouldn't do it using any of my normal user accounts.

        The best defence is to hire good people and don't treat them like shit... But lets not get crazy here.

    • by Anonymous Coward
      Having been through rounds of layoffs on multiple sides, I've always seen this coordinated between HR and one or two key IT people; IT will know in advance (at manager/director level), and coordinates to disable access while the employee is with HR, so when they step into that office access is still on and when they step out it's disabled. This was at smaller companies, probably larger ones operate differently.
    • by gweihir ( 88907 )

      Not only relevant for IT. You _always_ only inform people with any critical access that they are fired after their accounts are locked. My take is that this bank's IT is a complete mess (observe the lack of backups as additional evidence) and they may not have known he had that access and they may not have working SSO and account management. It is even possible he managed to log in using a non-personal technical account (which should not work at all from outside the server network) or the like.

      You do not gi

      • You would be surprised how companies are, when it comes to IT people. When I got notified I was laid off at a previous job, I wound up having to be the one who had to lay myself off, moving access to my replacement, then finally checking in a script into the company's Git server (GPG signed with the private key on a Yubikey) for the guy to run to finish removing access. Had I wanted to be a douchebag, I could have easily done so... but it would have resulted in bridges burned and other things (people with

        • by Darinbob ( 1142669 ) on Tuesday December 12, 2023 @08:48PM (#64077659)

          Modern IT teams are interchangeable cogs in a machine. The person who knew the procedures for layoffs was probably layed off and replaced with a clone who checked the right box next to "Microsoft Certificate in Stuff We Need Done". I wish I was making this stuff up, but the more experience you get in IT support the more people think you're being overpaid compared to the cheap guy overseas.

          • by gweihir ( 88907 )

            That bad?

            • It is if it results ithe cheap workers don't know what to do when someone is fired, and it results in a loss of their code repo.

          • I would assert and confirm that you are right. If the dude overseas is cheaper and supposedly has an alphabet soup of letters, they will offshore/outsource. Problem is that when the outsourcing company starts only using the second-string or third-string people, as opposed to the first-string techs which were used to get the contract.

            This is typical of the IT field. If stuff is working, management things they can replace you with an offshore dude for cents on the dollar. If stuff is not working, manageme

            • by flink ( 18449 )

              If they replaced you immediately after "laying you off", then they broke labour law. Layoffs are for role eliminations: i.e. no immediate replacement.

              • That depends on the area you live in. Where I live, it is an "at will" state. One can be laid off/separated/fired/termed for anything at anytime. At most labor laws might ensure you don't get stiffed on a paycheck if you are a direct employee.

    • by taustin ( 171655 )

      And keep your backups current.

      • The backups should be current and object-locked, with info on them going into a SIEM. That way, someone covering their tracks would have to wage a wide swath of destruction. Ideally, the SIEM should be owned by a different group altogether for separation of duties.

        • by taustin ( 171655 )

          Yeah, backups need to be done right, and not just to protect against crazy soon-to-be-ex employees.

    • by Luthair ( 847766 )
      Smaller companies especially startups don't always have the resources to be prepared.
      • by micheas ( 231635 )

        It is simple at small startups: the person doing the firing coordinates with the person who is going to pull access at the beginning of the termination meeting the access is pulled and the person pulling access texts the person doing the firing when access is revoked and it is okay to end the meeting.

        Now if you don't have a list of your critical accounts.... well you have bigger problems, but you can probably at least figure out that the password manager, AWS, and Google access needs pulled.

    • Victim blame much?

      • Fault won't bring the data back.

        • by Jeremi ( 14640 )

          One of the things I like about git is that everyone who checks out the repository has essentially a full backup of the repository (including all revisions, branches, and metadata) on their own computer.

          Therefore, in a company with N developers working on the code, even if That Guy does wipe out the github repository server(s) and the backup tapes turn out to be rubbish, there should still be (N-1) fairly up-to-date copies of your codebase still accessible.

    • by m2pc ( 546641 )

      ^ This. When I worked as a developer for a major corporation, I was let go due to a "last hired first fired" policy when the department got downsized. Before I even realized I was being let go, my network access suddenly stopped working. I went to my boss's office to ask about it and he said "there's some people from corporate in the conference room that want to see you". They handed me my severance check and I was escorted out of the building by security with a few of my personal belongings and mailed

      • by flink ( 18449 )

        If that's the way they want to handle it, then they should stop expecting 2 weeks notice from us. Just walk out when you find a new job. No KT for your existing team, no writing down all the things that are only in your own head, nothing.

    • by CaptainDork ( 3678879 ) on Tuesday December 12, 2023 @08:44PM (#64077651)

      This. I had a lady give two weeks' notice and NO ONE TOLD ME!She mentioned it to me in the lunch room on her last day. I checked with HR and they said it was true despite the Firm's mandate that I be notified first. Goddam. She deleted just about everything and back in that day everything was on a rotating backup for 30 days. We had stand-alone Outlook where the .pst file was on her hard drive and it was all gone. Because she was a paralegal, she handled all of her lawyer's emails.

      • This. I had a lady give two weeks' notice and NO ONE TOLD ME!She mentioned it to me in the lunch room on her last day. I checked with HR and they said it was true despite the Firm's mandate that I be notified first. Goddam. She deleted just about everything and back in that day everything was on a rotating backup for 30 days. We had stand-alone Outlook where the .pst file was on her hard drive and it was all gone. Because she was a paralegal, she handled all of her lawyer's emails.

        Same with me from the other side. I gave plenty of notice I was going to retire at each review, from 5 years down to when I put my notice in with a month to go. It was a real shock to them, but my boss "neglected" to tell the director or security. I kind of wondered why the big guy didn't talk with me about it - we were pretty close. HR certainly knew, but it was not their job - my top supervisor had the duty. On my last day, I was at lunch with a friend co-worker. And my phone lit up from the director's

      • by tlhIngan ( 30335 )

        This. I had a lady give two weeks' notice and NO ONE TOLD ME!She mentioned it to me in the lunch room on her last day. I checked with HR and they said it was true despite the Firm's mandate that I be notified first. Goddam. She deleted just about everything and back in that day everything was on a rotating backup for 30 days. We had stand-alone Outlook where the .pst file was on her hard drive and it was all gone. Because she was a paralegal, she handled all of her lawyer's emails.

        I've had it work the other

        • We are a small shop but big enough to have an HR department. We, as IT, are *constantly* trying to get the hiring people to inform us at least 3 days in advance of new employee start.

          I think it's just that hiring is a delicate process and even the people doing the hiring sometimes don't know until the last minute whether or not the person has accepted the job.

  • Before the person in question can leave the property, their credentials, keys, and any form of access should be fully wiped from all systems. The servers in question should have IP blocks in place to prevent them connecting, and the logs should be swept, repeatedly, for any access that is not IP and user validated!

    This is really more on the bank, then the person who was never restricted. This is a complete and total failure of protocol, and multiple people in the IT sphere, and Developer sphere, should p
    • This is really more on the bank, then the person who was never restricted.

      No, it's not. If you leave your house unlocked, you might be considered stupid... but it doesn't reduce the culpability of a thief who enters and takes your stuff.

      • This isn't just leaving the door open or unlocked, this is gifting a house after you kick your partner to the curb. An oversight of that level should trigger serious investigations, and probably lead to additional charges. If they're that careless with the infrastructure at the bank, then how could anyone trust them?
      • by Tyr07 ( 8900565 )

        No, it's not. If you leave your house unlocked, you might be considered stupid... but it doesn't reduce the culpability of a thief who enters and takes your stuff.

        You're right, but if you hired someone who had the job of locking your door when you leave, you'd fire that person for also not locking the door. It's not the banks fault that this person chosen to take these actions. It's the banks fault that this person was able to commit these actions.

    • by taustin ( 171655 ) on Tuesday December 12, 2023 @06:15PM (#64077287) Homepage Journal

      This is really more on the bank, then the person who was never restricted.

      No, this is on the guy who committed multiple felonies, and tried to lie his way out of it.

      The bank did things that were stupid, but he did things that were criminal.

      • As I just stated in another reply, this should trigger a serious investigation and charges against others at the bank.

        I worked for a company ~7 years ago, I can still login to their "master" server, they never changed the root login, and I've called the owner, emailed him, and gave him directions on how to do all the work required to lock me out. I've offered to drive to his house and do the work myself, to kill the accounts that should be taken off the server. His response the last time we talked (parap
        • As I just stated in another reply, this should trigger a serious investigation and charges against others at the bank.

          What laws were broken by the bank? Sounds like they failed to follow policies or procedures.

          • by taustin ( 171655 )

            What laws were broken by the bank?

            Possibly some civil laws, especially ones concerned fiduciary responsibilities towards shareholders.

            Other than that, only the one's in Murdoch5's revenge fantasies.

      • I think you may be missing the point here: The bank had a duty to protect itself and it failed to do so. That must be addressed (by the bank, not us) in order to be secure. And yes, dude needed to be prosecuted because he did something wrong... which should not have been damaging, but it was, because of poor procedures and protocols on the part of the bank. There is plenty of liability to go around and using your logic, the bank escapes it completely.

        • by taustin ( 171655 )

          I think you may be missing the point here:

          Are you a sock puppet for Murdoch5? He (you) specifically said more blame is on the bank, which, so far was we know, did nothing illegal, and certainly nothing criminal, than the criminal who committed multiple felonies. I'm not the only one who took issue with that, and he's (you're) now lying about what was said.

          I'm not missing the point, you're trying to change the subject.

          Dumbass.

          • Are you a sock puppet for Murdoch5?

            Absolutely not. Have you noticed any similarities at all other than you seem to disagree with both of us?

            He (you) specifically said more blame is on the bank

            Kind of, but not really. Your lack of nuance is fucking you over HARD here sir.

            The criminal deserves to be prosecuted for the crimes they CLEARLY committed. That prosecution does not absolve the security principals at the bank. They were charged with keeping these kinds of things from happening and due to their incompetence, those bad things happened. Do you think that should not be addressed?

            • by taustin ( 171655 )

              Are you a sock puppet for Murdoch5?

              Absolutely not. Have you noticed any similarities at all other than you seem to disagree with both of us?

              You're both trying (and failing) to deny that he claimed the bank officials, as individuals, have committed some criminal act.

              He (you) specifically said more blame is on the bank

              Kind of, but not really.

              Yes, really.

              Your lack of nuance is fucking you over HARD here sir.

              You need to learn to lie better.

              • You're both trying (and failing) to deny that he claimed the bank officials, as individuals, have committed some criminal act.

                Huh? WTF are you on about? I never claimed the bank was criminally liable. I said they were liable. That is the lack of nuance I was speaking of. You still have not answered whether or not that liability should be addressed.

                Honestly, I do not see this conversation going anywhere. We are not able to communicate for some reason. Have a nice day.

                • That guys is a troll, he tried to call me out for something I didn't say, and I quoted myself to prove it. Have a great holiday season!
    • by Onthax ( 1322089 )
      I don't know the company can legally detain you... can they? They can say, please don't leave but if they detain you that's kidnapping no?
      • They can't detain somebody but they don't need to. You setup a meeting with the boss. As soon as the employee is in the conference room, access is revoked. You ask them to leave things like the building access card but, if they don't, it's disable anyway.
      • No, but they can remove all your access, and then fire you! I would have every account locked before I tell the guy he's fired, and I'd have scanners running to sweep logs to make sure he stays out.
    • The bank's lack of controls and the former employee's misbehaviors are entirely separate issues and each is culpable for their own failings. That one failed in no way diminishes the responsibility of the other. The bank definitely needs to make some changes, but that's irrelevant when it comes to this guy's liability for his wrong actions.
      • If the CEO of the bank got prison time I might agree with you but since that won't happen then the ex-employee should be punished less.

      • The bank needs to make more than "some" changes, the lack of common sense is so forehead smacking stupid as to give serious brain damage. In all but 2 companies I've worked for, the safety around removing old user accounts is and was: "Meh, don't bother." I worked for an engineering company ~7 years ago, as their head of IT, Development, DevOps, DevSecOps, Infrastructure, and all around security guy. I had the servers locked down tighter than a nun's nasty. Forget about being let go from the company,
  • Wether you intensionally, unintentionally, or mistakenly delete something you need a backup. Daily Rolling Backups.Monthy backups Offsite backups. Backups that are immune to a humans or a fire.
    • by gweihir ( 88907 ) on Tuesday December 12, 2023 @05:46PM (#64077219)

      With proper regulation, not having those backups will get the board in hot water because they failed their oversight duties. They also failed to suspend hos accounts in a timely fashion (read: immediately, and if possible before the person is told that they are terminated). For banking IT such a failure is a big red flag and strongly indicates that they have really, really crappy IT.

    • Dear Bank Customers,

      Due to a screwup we had to just go ahead and revert everybody's balance to whatever it was last month. Sorry about any deposits you received in the interim. Nobody's perfect!

      Sincerely,
      Your Bank.

    • by Tyr07 ( 8900565 )

      They may in fact have backups that run regularly, unless this person also had access to the backups and wiped those. In addition, having backups doesn't go poof and restore everything with the flick of a switch, it still causes damages through downtime, loss productivity and the time it takes to restore and reset configurations to match the restore if needed etc.

  • Emailed code (Score:2, Insightful)

    by christoban ( 3028573 )

    "He also emailed himself proprietary bank code that he had worked on as an employee, which was valued at over $5,000."

    This was probably innocuous.

  • And in a bank, no less. No argument about his sentence, but the ones responsible for not suspending his access should probably share his cell.

    • by ShanghaiBill ( 739463 ) on Tuesday December 12, 2023 @06:02PM (#64077255)

      the ones responsible for not suspending his access should probably share his cell.

      If we make incompetence a crime, we're gonna need a lot more prisons.

      • by gweihir ( 88907 )

        True.

      • If we make incompetence a crime, we're gonna need a lot more prisons.

        In certain situations, incompetence *IS* a crime. Any regulated industry is rife with situations where incompetence can lead to jail time.

    • by MobyDisk ( 75490 )

      The ones responsible may have some liability here for being negligent, but not a criminal liability that would send them to jail.

      • The bank is very likely mandated to submit to audit and compliance burdens they assume, up to and including HITRUST, FedRAMP, FISMA.... someone @ that bank signed off that they had specific and listed/ documented procedures in place to prevent this type of employee action. That could very well turn into liability.
        • by Pascoea ( 968200 )

          That could very well turn into liability.

          Sure. They'll get a "naughty boy" letter from the Fed, some middle management lackey will get shown the door, and the executypes will get a raise for "demonstrating leadership through tough times" or some such bullshit.

        • by MobyDisk ( 75490 )

          Do you think that should result in jail time?

    • by taustin ( 171655 )

      but the ones responsible for not suspending his access should probably share his cell.

      Not a cell, but they certainly deserve to share the cardboard box they're living in.

    • No. Maybe they should be unemployed but they shouldn't be criminally charged. None of us know what happened. Maybe they did cut off his access but then they had to restore a backup of something and there was a timing issue. Who knows? We know enough of what he did to say he's guilty (as has been decided by a court). We can only guess at what happened at the bank's IT practice. (Although clearly it needs improved given what transpired)
    • by rskbrkr ( 824653 )

      And in a bank, no less. No argument about his sentence, but the ones responsible for not suspending his access should probably share his cell.

      Not in a cell, but the second guy is probably in the unemployment line. First Republic Bank failed and was closed by the FDIC in May of this year.

  • I don't usually side with companies on things, but this is one case where I hope he gets what's coming to him in the Federal Pound Me In The Ass prison. Granted the bank made a horrible mistake by not disabling his access while security was walking him out, but they shouldn't just have to eat the cost of someone else's criminal activity. I would be more sympathetic with him if the policy he violated didn't make sense, but who in their right mind walks around with a USB stick full of porn AND connected it
  • the IT guy who didn't back up the repos, and didn't disable the dude's access first and foremost, before HR got to him.

  • by Hoi Polloi ( 522990 ) on Tuesday December 12, 2023 @07:00PM (#64077403) Journal

    What a scumbag. I wonder if the guy in charge of locking accounts was him lol

    Reminds me of a story by Jim Koch, the founder of Sam Adams beer. Very early on, when he was just starting, he said that he had to fire a driver for stealing lots of beer when doing deliveries. Well he made the mistake of not getting the guy's keys first. He came in the next day to find his office door unlocked and a present on his desk.

  • this kind of an award could likely bite data providers in the ass. who gets 2 years in the slammer when a customer loses their data? or is data really not worth that much? which?

  • But in this case I do because the guy who was fired did something really stupid. I mean who in their right mind would plug in a thumb drive to a corporate desktop with pornography on it. I'd feel more for the guy if he was just let go due to corporate greed or something along those lines. At my job, we make it expressly clear that it violates IT security policy to plug in a thumb drive to your desktop in the first place.i
    • Dunno if you consider academia to be corporate enough, but I've seen some crazy stuff on staff, faculty, and lab machines ... a USB stick full of "plain ol' porn" is nothing....

    • by piojo ( 995934 )

      I dunno. Isn't it kind of sketchy that the computer scanned and logged the contents of his drive when he connected it? Is it an invasive violation of his privacy? As far as I see it, if the files aren't being moved onto the computer, the computer shouldn't be poking around. (If it does need to poke around for security reasons, it certainly shouldn't be logging or reporting embarrassing but non-threatening files.) Obviously the company should have made it unnecessary for him to use a personal device though.

      T

  • Oh wait, First Republic Bank went out of business this year.

  • by Misagon ( 1135 ) on Tuesday December 12, 2023 @08:35PM (#64077639)

    I have been let go twice from developer positions, that I haven't resigned from myself.
    Both times, it has been a matter of personal pride for me to commit my last code changes that I had been working on, for the sake of my colleagues, and then to say proper goodbyes to the people staying behind.
    I think I would be more pissed off if I wasn't allowed to do that, than to be let go.

    • Its not just a case of doing the right things (though it is) but of maintaining your reputation. You never know when you may want to be working with some of those people again. A positive vs. negative recommendation from former coworkers is extremely valuable.
  • He was fired on March 11, 2020. That seems right around the edge of when everyone started locking down.
  • Been programming for 37 years, doing professional web development for 23. Lots of douchebags, idiots, pointy haired bosses, clueless and obnoxious blowhards. Plenty of exits and layoffs.

    But I _always_ see to it that I make a clean and elegant exit. You never know when you bump back into people. And there are always people in the room who don't say much but know exactly what's going on and might get back to you when they've changed teams.

    IT personnel must and should have a work ethic. Destroying your clients

  • Can someone find where his employer was fined for not terminating his access?

As far as the laws of mathematics refer to reality, they are not certain, and as far as they are certain, they do not refer to reality. -- Albert Einstein

Working...