Out- sourcing Your Own Job.

By Posted in - Code & Computers & Network & Programming & Security & Whimsy on January 16th, 2013 georgeUnderDesk

Pretty funny but damn, this takes balls, and a complete lack of conscience or regard for co-workers. A developer at Verizon was busted for outsourcing his entire job to China (he FedEx’d his VPN key fob to a Chinese company who then used it to log in as him). While someone in China was writing his code, he sat at his desk and surfed all day.

You can read the story at Huffington Post. I have copied and pasted it below in the event the link dies. Below that is the actual case study from Verizon (from which HuffPost, et al, gathered their material for their write-ups). They wrote it up as why it might be good to practice pro-active log reviews (the employee was caught due to logs showing VPN logins coming in from China which were subsequently thought to be hackers).

Unfortunately, this fellow probably did a HUGE disservice to his fellow employees. He has alerted management and now Verizon is probably thinking, “Wait! We could outsource this entire department.” Hell, they are probably already in negotiations with the Chinese company. While at face level his idea may seem clever, as soon as you scratch the surface, you realize this guy deserves a Douchebag of the Year award.

========================================
Developer Outsourced Entire Job To China, Spent Hours Surfing The Web, Watching Cat Videos
The Huffington Post | By Meredith Bennett-Smith
Posted: 01/16/2013 4:31 pm EST | Updated: 01/16/2013 5:14 pm EST

A crafty developer reportedly figured how to get paid to sit and watch cat videos for a good chunk of the day.

It’s a story almost too good to be true — and one which has an almost uncanny resemblance to this fake news story run by The Onion. But according to Verizon’s Security Blog, a U.S. developer actually did find a way to fool everyone at his company into thinking he was working, while in fact outsourcing his entire job to China.

Andrew Valentine wrote up the case study for Verizon, and the story apparently caused such a furor it temporarily crashed the Verizon servers.

Citing the study, the BBC notes the ingenious scam came to light after the employee’s company asked for an audit to investigate “anomalous activity on its virtual private network (VPN) logs” that pointed to an active VPN connection between Shenyang, China, and the employee’s workstation that appeared to be operational for months.

Valentine went so far as to profile the employee, who is not named in the report, and who was paying less than “one fifth of his six-figure salary” on the outsourcing:

Mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator.
A check of the employee’s web browsing history revealed an average schedule. According to the case study, the worker’s day looked like this:

9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch

1:00 p.m. – Ebay time.

2:00–ish p.m – Facebook updates – LinkedIn

4:30 p.m. – End of day update e-mail to management.

5:00 p.m. – Go home

According to The Register, the employee no longer works for the company that ordered the audit. (As Gizmodo’s Jamie Condliffe quipped, “Looks like he’ll be spending more time on LinkedIn from now on.”)

Help Net Security reached out to Nick Cavalancia, a vice president at SpectorSoft, to gather information on how companies may work to prevent similar schemes.

“We have yet to see what impact this incident will have, but providing programming code used to run critical national infrastructure providers’ systems to off-shore firms seems dangerous at best,” Cavalancia said. “What many organizations fail to understand is that with proactive monitoring that can alert IT security teams when unacceptable online behaviors occur, this type activity can be thwarted before it becomes an incident.”

==============================================================================
Case Study: Pro-active Log Review Might Be A Good Idea

http://securityblog.verizonbusiness.com/2013/01/14/case-study-pro-active-log-review-might-be-a-good-idea/

Andrew Valentine
January 14th, 2013
With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators.

Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it.

Besides the obvious, this discovery greatly unnerved security personnel for three main reasons:

They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.
The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming.
The developer whose credentials were being used was sitting at his desk in the office.
Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be?

Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time.

Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China.

Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”

The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.

As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.

As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.

A typical ‘work day’ for Bob looked like this:

9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos

11:30 a.m. – Take lunch

1:00 p.m. – Ebay time.

2:00 – ish p.m Facebook updates – LinkedIn

4:30 p.m. – End of day update e-mail to management.

5:00 p.m. – Go home

Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.

This entry was posted on Monday, January 14th, 2013 at 2:46 pm and is filed under Editorial. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Please leave a Comment...