Verizon finds US developer outsourced his job to China so he could surf Reddit and watch cat videos
- 293
-
27,514shares
-
-
BBOff
No, this is not the Onion, itâs not April Fools, and Iâm not making this up. All of this comes straight from Verizon, or more specifically, a case study from 2012 outlined by its security team.
See also â Verizon investigator: How one US developer could have gotten away with outsourcing his job to China
New York, are you ready?
Weâre building Momentum: an all killer, no filler event this November.
The story goes a little something like this. A developer at a US-based critical infrastructure company, referred to as âBob,â was caught last year outsourcing his work to China, paying someone else less than one fifth of his six-figure salary to do his job. As a result, Bob had a lot of time on his hands; in fact, during the investigation, his browsing history revealed this was his typical work day:
- 9:00 a.m. â Arrive and surf Reddit for a couple of hours. Watch cat videos.
- 11:30 a.m. â Take lunch.
- 1:00 p.m. â Ebay time.
- 2:00 â ish p.m Facebook updates â LinkedIn.
- 4:30 p.m. â End of day update e-mail to management.
- 5:00 p.m. â Go home.
Again, I want to emphasize that I havenât invented this schedule for the sake of making this story more interesting or to have a snazzy headline. This comes straight from Verizon; take that as you will.
Apparently Bob had the same scam going across multiple companies in the area (this part is a little unclear given that he clearly couldnât physically go into work for all of them), earning âseveral hundred thousand dollars a year,â and only paying the Chinese consulting firm âabout fifty grand annually.â At the unnamed company, he apparently received excellent performance reviews for the last several years in a row, even being hailed the best developer in the building: his code was clean, well-written, and submitted in a timely fashion.
Folks, you canât make this stuff up. Here are the rest of the crazy details, which Verizon says it released because although this wasnât a large-scale data breach that made headlines, the case had a unique attack vector.
Apparently the scheme was discovered accidentally. Verizon received a request from the US company asking for help in understanding anomalous activity it was witnessing in its VPN logs: an open and active connection from Shenyang, China.
This was alarming because the company had implemented two-factor authentication for these VPN connections, the second factor being a rotating token RSA key fob. Yet somehow, although the developer whose credentials were being used was sitting at his desk staring into his monitor, the logs showed he was logged in from China.
This unnamed company initially suspected some kind of unknown (0-day) malware that was able to initiate VPN connections from Bobâs desktop workstation via external proxy, route that VPN traffic to China, and then back. When Verizon investigated, it eventually noticed that the VPN connection from Shenyang was at least six months old, which is how far back the VPN logs went, and it occurred almost daily and occasionally spanned the entire workday.
Unable to explain how an intruder could have possibly been accessing the companyâs internal system on such a frequent basis, Verizon decided to look more closely at Bob, since it was his credentials that were being used. Hereâs how his the case study described him:
Employee profile âmid-40âs software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldnât look at twice in an elevator.
All it took was a look a forensic image of Bobâs desktop workstation to discover hundreds of PDF invoices from a Chinese consulting firm in Shenyang. How did he get around the security requirements? He physically FedExed his RSA token to China.
See also â Verizon investigator: How one US developer could have gotten away with outsourcing his job to China
Image credit: Andreas Krappweis
Read next: China and Taiwan are linking up with their first cross-strait submarine cable
Comments