π₯ Fired, he deleted 180 VMs out of revenge! π¨π»
It's rare, but it happens all the time. How can you protect your company's IT assets?
I was reading this article from CISOAdvisor1, "Fired, he deleted 180 QA virtual machines," about the guy from India who, after being fired, simply logged into the server and wiped out all the companyβs virtual machines.
The worst part? It wasnβt an impulsive attackβhe had already planted a backdoor before leaving. The damage was massive, causing operational delays and significant financial losses ($678K), as the company had to rebuild the entire testing environment. Now, the former employee is facing criminal charges and could get a tough sentence, while the company scrambles to strengthen its security controls to prevent another "ex" from getting the same idea.
This wasnβt the first case, and it wonβt be the last. About five years ago, something similar happened at Cisco2. In 2018, a former employee who had resigned from the company decided to leave his mark before walking away. Five months after his departure, he gained unauthorized access to Ciscoβs systems and deleted 456 virtual machines used for Webex, the companyβs video conferencing platform.
This wasnβt just an act of sabotageβit disrupted services for over 16,000 users and forced Cisco into a race against time to restore data and minimize damage. He accessed the systems using still-active credentials and executed destructive commands through scripts. The attack resulted in millions of dollars in losses for Cisco, both in infrastructure recovery and reputational damage. Eventually, he was convicted in the U.S., fined, and sentenced to prison.
Incidents like this highlight the critical need for strict access control measures, especially during employee offboarding, to ensure that critical systems arenβt left vulnerable to acts of revenge.
I remembered a caseβnot exactly the same, but the closest Iβve personally experienced. Many years ago, I was working as a contractor for a software house, developing Java systems for a government client in a Linux environment.
At the time, cryptocurrencies were just starting to take off, and a lot of people were rushing to make money with crypto mining.
Some systems were experiencing extreme slowdowns. I analyzed the architectureβit was built with Java, Hibernate, and Oracleβbut unfortunately, I didnβt have direct access to the server, only to the code, so I could look for potential bottlenecks. After hours of analysis, running profiling on a test server, tweaking cache settings, and making performance adjustments, I hit a dead end. Nothing justified the slowdown, so I had to request access to the production server and conduct an analysis alongside the clientβs employee.
First interesting discovery: when I accessed the VM via SSH, the CPU usage suddenly dropped, and the system ran normally. But as soon as I logged out, the CPU spiked again, causing severe slowdowns in the application.
Investigating as root, I was in for a surpriseβI found a Monero mining script running on the server. The script was cleverly designed to pause whenever someone logged into the system and resume mining as soon as no one else was logged in, except for the scriptβs own user.
At first, I thought it was just an external breachβafter all, there were plenty of vulnerabilities in applications back then that allowed remote execution of scripts. For example, Apache Solr and Elasticsearch had exploits around 2012/2018 where anyone could run a wget
command via a simple search query.
But that wasnβt the case. After digging through the logs, I found out that it was an internal jobβa clientβs own employee had installed the mining script. Even worse, he was an infrastructure analyst, so he had the access but not much programming knowledge. He had simply copied the script from some forum and followed the instructions.
He probably didnβt even make $100, but it cost him his job. Unfortunately, I canβt name the companies involved since his dismissal was published in the governmentβs official records, and it wouldnβt be too hard to connect the dots.
Obviously, I wasnβt involved in his dismissal or the confrontationβI was just a third-party consultant. But later, I heard that the guy had no idea he was doing something wrong or that it could harm anyone.
Apparently, he was also mining crypto on his own machine and even on university computers.
GOD.
Just like a mining script can cripple system performance, other scripts can cause even more damageβremoving software, copying data elsewhere, granting third-party access, and more.
Now, imagine something like this exporting customer dataβthis isnβt just a security failure; itβs a data breach.
One of the most overlooked aspects in cases like this is the impact on privacy and data protection. When a former employee still has access to critical systems, itβs not just the infrastructure at riskβitβs also personal data. Deletion or leakage of sensitive information can result in compliance violations under almost every modern privacy regulation, leading to fines and reputational damage. And letβs not forget: insider threats are harder to detect and mitigate because they often come from someone who already knows the systemβs architecture and weak points.
These cases highlight the fact that internal threats remain one of the biggest security risks for any organization. Whether itβs revenge or simply exploiting overlooked gaps, ex-employees can cause massive damage if access controls and monitoring arenβt properly enforced. Human error and lack of processes, like failing to revoke credentials or perform continuous audits, make these situations possible.
https://www.cisoadvisor.com.br/demitido-ele-deletou-180-maquinas-virtuais-de-qa/
https://threatpost.com/cisco-employee-convicted-deleting-webex-accounts/162246/
Great point that this type of insider attack also can expose personal information and data of the customer base. Great article!