The Warring States of NPF  

Go Back   The Warring States of NPF > Social > Bullshit Mountain
User Name
Password
FAQ Members List Calendar Today's Posts Join Chat

Reply
  Click to unhide all tags.Click to hide all tags.  
Thread Tools Display Modes
Unread 01-16-2013, 08:12 PM   #1
synkr0nized
synk-ism
 
synkr0nized's Avatar
 
Join Date: Nov 2003
Location: throughout the Wired
Posts: 6,861
synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law. synkr0nized isn't just above the law -- they are the law.
Send a message via ICQ to synkr0nized Send a message via AIM to synkr0nized Send a message via MSN to synkr0nized Send a message via Skype™ to synkr0nized
Fun Internet Personified - Man Outsources Job to Watch Cats and Shit

Putting this in General, 'cause it's not like I'm looking for some deep debate. I kind of want to slow-clap for the guy despite the potential security breach he enabled. I suppose we could argue about the ethics of this, too.

Short version: guy wants to spend his time at work looking at lolcats and browsing Reddit or whatever; outsources his own job to Chinese programmers and pays them a fraction of his own salary; VPN hits from China raise enough flags to eventually have him investigated despite continued high marks/performance in reviews

Verizon Business Security Article (where many of the other articles I found on this seem to be sourcing their data)


Quote:
With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators.

Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it.

Besides the obvious, this discovery greatly unnerved security personnel for three main reasons:

They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.
The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming.
The developer whose credentials were being used was sitting at his desk in the office.

Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be?

Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time.

Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China.

Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”

The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.

As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.

As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.

A typical ‘work day’ for Bob looked like this:

9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos

11:30 a.m. – Take lunch

1:00 p.m. – Ebay time.

2:00 – ish p.m Facebook updates – LinkedIn

4:30 p.m. – End of day update e-mail to management.

5:00 p.m. – Go home

Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.
__________________

Find love.
synkr0nized is offline Add to synkr0nized's Reputation   Reply With Quote
Unread 01-17-2013, 03:30 AM   #2
Professor Smarmiarty
Sent to the cornfield
 
Professor Smarmiarty's Avatar
 
Join Date: Mar 2007
Location: K-space
Posts: 9,758
Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law.
Send a message via MSN to Professor Smarmiarty
Default

This article screams of the yellow peril.
Professor Smarmiarty is offline Add to Professor Smarmiarty's Reputation   Reply With Quote
Unread 01-17-2013, 06:56 AM   #3
The Artist Formerly Known as Hawk
War Incarnate
 
The Artist Formerly Known as Hawk's Avatar
 
Join Date: Aug 2006
Location: The Nexus
Posts: 5,379
The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier. The Artist Formerly Known as Hawk is like Reed Richards, but prettier.
Send a message via MSN to The Artist Formerly Known as Hawk
Default

This is fantastic.
__________________
Quote:
Originally Posted by Fifthfiend
Nuklear Power Forums: Less of a Shithole Than Most Other Places on the Internet.
Quote:
Originally Posted by Azisien View Post
"ROOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOAR I AM A GIANT SPACE TURTLE!!!"
PSN - Hawk_of_Battle
The Artist Formerly Known as Hawk is offline Add to The Artist Formerly Known as Hawk's Reputation   Reply With Quote
Unread 01-17-2013, 09:33 AM   #4
Jagos
FRONT KICK OF DOOM!
 
Jagos's Avatar
 
Join Date: Nov 2003
Location: Howdy pardner...
Posts: 6,399
Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch. Jagos can see why kids love Cinnamon Toast Crunch.
Send a message via Yahoo to Jagos
Default

I am shocked speechless...
Jagos is offline Add to Jagos's Reputation   Reply With Quote
Unread 01-17-2013, 09:52 AM   #5
Kyanbu The Legend
Local Rookie Indie Dev
 
Kyanbu The Legend's Avatar
 
Join Date: Dec 2008
Location: New Jersey
Posts: 5,497
Kyanbu The Legend is a real American hero. Kyanbu The Legend is a real American hero. Kyanbu The Legend is a real American hero. Kyanbu The Legend is a real American hero. Kyanbu The Legend is a real American hero. Kyanbu The Legend is a real American hero.
Send a message via MSN to Kyanbu The Legend
Default

AH that's fantastic! XD

He had to have been fired after that. lol
Kyanbu The Legend is offline Add to Kyanbu The Legend's Reputation   Reply With Quote
Unread 01-17-2013, 10:19 AM   #6
Professor Smarmiarty
Sent to the cornfield
 
Professor Smarmiarty's Avatar
 
Join Date: Mar 2007
Location: K-space
Posts: 9,758
Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law. Professor Smarmiarty isn't just above the law -- they are the law.
Send a message via MSN to Professor Smarmiarty
Default

Now that I've gotten over the outrageous 1920s journalism, my friend actually did this and outsourced most of his job to places in Africa but then he lost his job because his boss was like "why do we need you"
Professor Smarmiarty is offline Add to Professor Smarmiarty's Reputation   Reply With Quote
Unread 01-18-2013, 11:04 AM   #7
Magus
Archer and Armstrong vs. the World
 
Magus's Avatar
 
Join Date: Apr 2005
Location: Pennsylvania
Posts: 7,164
Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something. Magus broke the dial off at twelve but is probably at infinity or something.
Send a message via AIM to Magus
Default

Quote:
Originally Posted by Professor Smarmiarty View Post
Now that I've gotten over the outrageous 1920s journalism, my friend actually did this and outsourced most of his job to places in Africa but then he lost his job because his boss was like "why do we need you"
The true fear of the executives was that Bob had figured out how to do what THEY do: delegating tasks to underlings while doing very little themselves. They looked into the Abyss, and it looked back into them. They could not stand the mirror-image of uselessness they had just exposed and so Bob had to be canned to save their own sanity. This vicarious firing of their own useless selves gave cathartic release to them, allowing them to move forward in their own tasks of paying people to do their work for them.
Magus is offline Add to Magus's Reputation   Reply With Quote
Unread 01-18-2013, 12:22 PM   #8
RobinStarwing
C.M.B.A.S.O.B
 
RobinStarwing's Avatar
 
Join Date: Jun 2010
Location: Everywhere until you look at me.
Posts: 737
RobinStarwing is a ray of sunshine lighting up your life. RobinStarwing is a ray of sunshine lighting up your life. RobinStarwing is a ray of sunshine lighting up your life. RobinStarwing is a ray of sunshine lighting up your life.
Send a message via Yahoo to RobinStarwing
Default

...
...
...
...
THAT'S IT! I QUIT THE HUMAN RACE! *Starts trying to build a portal machine to go to one of the many fantasy worlds he enjoys.*
__________________
NPF's resident Crazy Magnificent Bastard Ass Son Of A Bitch (CMBASOB)

Accept No Substitutes
Also known as "The Least Interesting Man in The World" according to multiple surveys
RobinStarwing is offline Add to RobinStarwing's Reputation   Reply With Quote
Unread 01-18-2013, 01:20 PM   #9
Bum Bill Bee
Boo Buddy
 
Bum Bill Bee's Avatar
 
Join Date: Aug 2012
Posts: 454
Bum Bill Bee is so pumped up.
Default

WHOAHOHO! That's some incomprehensible shizzle to me, since I

A. Have always had a massive-ass disinterest in Facebook or social networking for that matter

B. Have never even heard of Reddit until 3 months ago

C. Mostly just use Youtube to listen to music, and watch a few TV shows, game walkthroughs


Oh, and my working a 7.80 per hour factory job among hundreds of immigrants and disableds dosen't help me connect with that guy either.
Bum Bill Bee is offline Add to Bum Bill Bee's Reputation   Reply With Quote
Unread 01-18-2013, 02:21 PM   #10
Azisien
wat
 
Azisien's Avatar
 
Join Date: Jan 2005
Posts: 7,177
Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't. Azisien can secretly fly, but doesn't, because it would make everyone else feel bad that they can't.
Default

This guy is nothing short of fantastic. I wonder if he made enough to retire.
Azisien is offline Add to Azisien's Reputation   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 03:11 PM.
The server time is now 08:11:13 PM.


Powered by: vBulletin Version 3.8.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.