Employee Subcontracts Own Work to China, Collects Full Salary, Watches Cat Videos

This sounds like something from a Dilbert comic. An employee pays a Chinese worker a fraction of his own salary to do his work for him, and spends the day goofing around at the office.

Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”

The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.

As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.

As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.

A typical ‘work day’ for Bob looked like this:

9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos

11:30 a.m. – Take lunch

1:00 p.m. – Ebay time.

2:00 – ish p.m Facebook updates – LinkedIn

4:30 p.m. – End of day update e-mail to management.

5:00 p.m. – Go home

Evidence even suggested he had the same scam going across multiple companies in the area.

via Verizon Business Security Blog » Blog Archive » Case Study: Pro-active Log Review Might Be A Good Idea.

Post was last modified on %s = human-readable time difference 2:04 pm

Share
Published by
Dennis G. Jerz

Recent Posts

I just caught myself thinking, “This doesn’t suck.” #medievalyork #mysteryplay #blender3d #design #aesthetics

I just caught myself thinking, “This doesn’t suck.” #medievalyork #mysteryplay #blender3d #design #aesthetics

1 day ago

A spooooooky post about predatory journals for this Halloween season.

Predatory publications are not concerned with writing quality (or even coherence), and thus also do…

2 days ago

Diaper Money Camaro Comes Home Four Decades Later

“While my dad has always spoken lovingly and fondly of his old Camaro he sold…

1 week ago