{"id":552,"date":"2009-01-30T11:15:25","date_gmt":"2009-01-30T19:15:25","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=552"},"modified":"2009-01-30T11:15:25","modified_gmt":"2009-01-30T19:15:25","slug":"ex-fannie-mae-worker-charged-with-planting-computer-virus","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/30\/ex-fannie-mae-worker-charged-with-planting-computer-virus\/","title":{"rendered":"Ex-Fannie Mae worker charged with planting computer virus"},"content":{"rendered":"<p>According to the D.C. Examiner, a virus, allegedly planted by an<br \/>\nex-employee, was recently discovered among Fannie Mae&#8217;s 4,000 computer<br \/>\nservers.\u00a0 The virus would have first disabled the companies&#8217; computer<br \/>\nmonitoring systems, then restricted all employee access, begin erasing all of<br \/>\nthe companies&#8217; data, and finish by shutting down every machine.\u00a0 According to<br \/>\nprosecutors, this would have caused millions of dollars worth of damage,<br \/>\nunderstandably, and halted all of Fannie Mae&#8217;s computer operations for at<br \/>\nleast a week.<br \/>\nThe article is somewhat vague on how or when the virus was found, but<br \/>\nsome of the dates connected with the article provide cause for alarm.\u00a0 The<br \/>\nemployee allegedly responsible was fired on October 24th for attempting to<br \/>\ntamper with certain server&#8217;s settings.\u00a0 The virus mentioned in this article,<br \/>\nhowever, was installed before this date, and set to attack on January 31st.<br \/>\nThe article was written two days before this would happen on the 29th, leading<br \/>\none to believe that the virus was hidden amongst Fannie Mae&#8217;s code for at<br \/>\nleast several months before being discovered.\u00a0 The company should be commended<br \/>\nfor recognizing a possible insider attack in October when they fired the<br \/>\nemployee, however perhaps they could have done more to investigate the actions<br \/>\nof that employee such that this potentially devastating virus could have been<br \/>\nfound earlier.<br \/>\nThis story, and ones similar, emphasize how crucial it is for<br \/>\ncompanies to protect themselves from insider attacks.\u00a0 These precious servers<br \/>\ncannot exist in isolation, however their access and updates need to be<br \/>\nstrictly monitored in order to minimize the risk of malicious software being<br \/>\ninstalled by trusted parties.\u00a0 Arbiters of these systems could consider<br \/>\npersonally approving every update pushed onto a server, and installing a<br \/>\nsecurity system that would only allow these changes to be made, however this<br \/>\nin and of itself presents its own problems.\u00a0 This solution might not be<br \/>\nfeasible for large scale systems, and also one might imagine another slough of<br \/>\nsecurity holes in the new update monitoring system.\u00a0 At a more fundamental<br \/>\nlevel, this solution really only moves the burden of trust up the chain of<br \/>\ncommand, and thus the same insider vulnerabilities arise, albeit for a<br \/>\nsmaller and more trusted set of individuals.\u00a0 The best security from these<br \/>\nforms of attacks may be deterrence, by enacting strict punishments and hard<br \/>\njail-time for perpetrators of these attacks.\u00a0 The threat of arson charges<br \/>\ndeters disgruntled employees from burning down office buildings, perhaps<br \/>\nsimilarly draconian laws regarding computer intrusion would better deter<br \/>\nattacks such as these.<\/p>\n<p>Article:\u00a0 http:\/\/www.dcexaminer.com\/local\/012909-Ex-Fannie_Mae_worker_charged_with_planting_computer_virus.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the D.C. Examiner, a virus, allegedly planted by an ex-employee, was recently discovered among Fannie Mae&#8217;s 4,000 computer servers.\u00a0 The virus would have first disabled the companies&#8217; computer monitoring systems, then restricted all employee access, begin erasing all &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/30\/ex-fannie-mae-worker-charged-with-planting-computer-virus\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":86,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[170,171],"class_list":["post-552","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-insider-attack","tag-virus"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=552"}],"version-history":[{"count":2,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/552\/revisions"}],"predecessor-version":[{"id":554,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/552\/revisions\/554"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}