Cyber Security

Fired NY credit union employee deletes 21GB of data in revenge

0

Juliana Barile, a former employee of a New York credit union, pleaded guilty for unauthorized accessing of the financial institution’s computer systems and destroying over 21 GB of data in revenge for being fired.

Barile secretly accessed the computer system of New York Credit Union, and deleted mortgage loan applications and other sensitive information maintained on its file server.

According to court documents, the defendant worked remotely as a part-time employee for the credit union until May 19, 2021, when she was fired.

The credit union employee asked the bank’s information technology support firm to disable Barile’s remote access credentials but the access was not removed. Two days later, on May 21, Barile logged on for roughly 40 minutes and deleted over 20,000 files and around 3,500 directories, totaling roughly 21.3 GB of data stored on the bank’s share drive.

The deleted data includes files related to customers’ mortgage loan applications and the financial institution’s anti-ransomware protection software.

Barile also opened various confidential Word documents, including files containing board minutes for the credit union.

The New York credit union had backups of some of the data deleted by the defendant. But they also had to spend more than $10,000 to restore the destroyed data following Barile’s unauthorized intrusion.

FBI Assistant Director-in-Charge Driscoll stated that the defendant may have thought she was getting back at her employer by deleting files, however she did just as much harm to customers.

Her revenge has not only created a huge security risk for the bank, but also for the customers who were depending on paperwork and approvals to pay for their homes.

Image Credits : CIO.com

Priyanka R
Cyber Security Enthusiast, Security Blogger, Technical Editor, Author at Cyber Safe News

     Threat actors stole crypto assets from Cream Finance

    Previous article

    WhatsApp Photo Filter bug could have led to user data exposure

    Next article

    You may also like

    Comments

    Leave a reply

    Your email address will not be published. Required fields are marked *