Significantly, ninety percent of organizations feel vulnerable to insider threats.  That alarming statistic was recently published in the annual Insider Threat Report released by Crowd Research Partners. In fact, the survey respondents express almost equal concern regarding malicious insiders (47%) as they do accidental insiders (51%). Recognizing and responding to the risk posed by insider threats is essential. What is one of the main enabling risk factors? Too many users with excessive access privileges.  When those access privileges are in the hands of a malicious insider the risks are significant. A disgruntled employee, or a non-deprovisioned ex-employee that feels wronged by their employer, possess two key components needed to cause damage: access and motivation.  

Insider Threats Recognize and Respond to the Risk Within

Disgruntled/Rogue Employee

Consider this example: Andrew Skelton, a senior IT auditor employed by Morrisons Supermarket PLC, deliberately leaked the payroll information of approximately 100,000 current and former Morrisons employees to a file sharing website and to three English newspapers. What was his motivation? Mr. Skelton held a grudge against Morrisons because of an earlier internal disciplinary matter. As a result of the data breach, over 5,000 current and former Morrisons employees filed a class action suit against Morrisons for damages incurred. In December 2017, England’s High Court of Justice Queens Bench Division ruled that Morrisons is vicariously liable for the actions of the disgruntled employee, Mr. Skelton. Clearly, privileged access in the hands of a disgruntled employee was an insider threat that produced extensive and far-reaching damage. 

The Ex-Employee

A survey conducted by OneLogin produced another alarming statistic; fifty percent of ex-employees retain access to corporate applications after their employment has ended. When you consider that most disgruntled employees will end up leaving, either voluntarily or not, failure to deprovision means access and motivation are in place to initiate a devastating attack.  Even if the employment is ended on friendly terms, the ex-employee could be recruited by malicious actors offering financial incentives for their access. The risk is very real. Twenty percent of the companies represented in the OneLogin survey experienced a data breach due to failure to deprovision an employee.

Consider this example: Brian P. Johnson, IT specialist and systems administrator, for Georgia-Pacific had his employment terminated on February 14, 2014 and was escorted off the premises. However, his access to corporate applications remained in place. He used his access to transmit harmful code and commands; in some instances, bringing Georgia-Pacific’s Port Hudson’s mill production to a standstill. FBI agents assigned to investigate the case concluded that Mr. Johnson intentionally sabotaged his former employer as payback.  

As these data breaches show, failure to deprovision an ex-employee and failure to recognize and monitor a disgruntled employee led to significant losses to both company reputation and revenue.   

Recognize and Respond

All employees require knowledge or access to empower them to do their work. However, it’s noteworthy that ‘too many users with excessive access privileges’ was identified as an enabling risk factor.  Clearly, policies that limit access should be in place and implemented to minimize insider threat risk, whether malicious or accidental.  Employee education combined with guidelines and policies for recognizing and monitoring a rogue/disgruntled employee are necessary for security threat management. When the employment termination process begins, clear procedures to promptly remove access to corporate applications are vital.

This article by the CERT Division of the Software Engineering Institute (SEI) provides a list of 19 best practices that can help mitigate the risk of IP theft, IT sabotage, and fraud that may exist due to a disgruntled or ex-employee. It’s true that you can never reduce your risk of an insider threat to zero. However, by recognizing and responding to the risk through preparation and education it can be minimized.  

“By failing to prepare, you are preparing to fail.”  – Benjamin Franklin 

Sources: 
https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf 
https://www.social-engineer.org/framework/general-discussion/categories-social-engineers/disgruntled-employees/ 
https://www.judiciary.gov.uk/wp-content/uploads/2017/12/morrisons_approved_judgment.pdf 
https://www.justice.gov/usao-mdla/pr/former-systems-administrator-sentenced-prison-hacking-industrial-facility-computer 
https://www.onelogin.com/press-center/press-releases/new-research-from-onelogin-finds-over-50-of-ex-employees-still-have-access-to-corporate-applications 
https://www.cert.org/insider-threat/best-practices/ 

Need an Event Speaker?

Get in touch today to schedule one of our staff to speak at your event

Get In Touch

Social Engineering Training

Visit our corporate site to get information on the world’s only practical, scientific, and certified social engineering courses.

Find Out More

Join the Newsletter


Join the Newsletter