Home » Consumer News »Verizon » Currently Reading:

Turnabout: Verizon’s RISK Security Team Ferrets Out Employee Outsourcing His Own Job to China

Phillip Dampier January 17, 2013 Consumer News, Verizon 2 Comments
Downtown Shenyang

Downtown Shenyang

When corporate executives discover the merits of outsourcing jobs to overseas workers in China or India, that wins them a large bonus for improved efficiency and successful cost-cutting. When an enterprising employee does the same thing, that is a heinous security risk.

Verizon’s RISK Team, which sells enterprise-level security services to large companies, discovered a “severe” security threat when it went to work for a “critical U.S. infrastructure company” (which goes unnamed) that found some unusual activity in its private network logs.

It all started when the company began shifting employees away from in-office work towards cheaper telecommuting. To allow this to happen, a secure virtual private network was established allowing developers to manage their work from home.

When the company began reviewing the network logs, it discovered a curious workday connection being established almost daily originating from Shenyang, China. The company hired Verizon’s RISK Team to consider the implications.

Company security personnel were initially concerned the Chinese had infiltrated their private network even though network access required the use of a rotating token RSA key fob. Even harder to understand, security officials watched the employee working at his office desk at the same time.

Was it a Chinese intelligence agency break-in? Malware? Hackers?

No, it turned out the employee, who Verizon calls “Bob,” had simply outsourced his job responsibilities to a contracting firm in China.

Company officials authorized some infiltration of their own, asking Verizon to review a forensic image quietly obtained from Bob’s workstation. Verizon security officials were surprised when they found hundreds of .PDF invoices sent from the third party contractor-developer… in Shenyang, China. Verizon’s RISK blog explains further:

verizon businessAs it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less than one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedEx’d his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.

A typical ‘work day’ for Bob looked like this:

  • 9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
  • 11:30 a.m. – Take lunch
  • 1:00 p.m. – Ebay time.
  • 2:00 – ish p.m Facebook updates – LinkedIn
  • 4:30 p.m. – End of day update e-mail to management.
  • 5:00 p.m. – Go home

Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.

Currently there are 2 comments on this Article:

  1. ben says:

    I can’t believe he didn’t realize they would see this. He could have easily set up a proxy at his house (with a few hundred grand a year, he could have had a team come in and build an amazing one if he didn’t have the knowledge to set up a Linux server) and the Chinese IP would never have appeared in the logs. What a crafty moron.

  2. Scott says:

    Funny, if there company wasn’t so butthurt about an employee outsourcing his own job before they outsourced him, they probably would have promoted him to management for figuring out how to source quality Chinese programming labor at a fifth of his salary, then had him scale and manage them to work on more projects.

Search This Site:

Contributions:

Recent Comments:

  • Jonny: My smaller cable company Suddenlink (1.4M customers) started the same thing. 250GB cap with with their medium speed of 50mbps. They are only doing thi...
  • Joe V: Man these guys just don't get it. Not to worry, just as the music industry learned the hard way that to piss off their customers by giving them crap, ...
  • Mike D.: The TV providers have never been willing to fight for the consumer with the other conglomerates who bundled crap with one or two channels of good cont...
  • Sean Colbert: The comcast cap isnt even bad compared to mine. I have Hughesnet Gen4 (All I can get in my area) and I have a 20gb a month limit with an extra 50 in b...
  • zychor: 59Mbps down, 5.9Mbps up ..it doesn't matter internet is so slow...
  • Phillip Dampier: Rats... and I knew I caught this in the proofread and made the change but it stayed a draft while the inaccurate one went live. Thanks for catching th...
  • Dave: Quit whining....bunch of babies...
  • bob: how is this fair to existing customers who reside in areas where upgrade hasnt gone through. im supposed to pay 60 plus dollars each month for extreme...
  • Michael Elling: Paul, part of this stems from the industry's infatuation with vertical models and the govt-granted quasi-monopoly structure stemming from spectrum sal...
  • Paul Houle: One of the funny things about the current debate is that communities everywhere are asking for better wireline broadband, but you don't see many peop...
  • Duffin: I have just dropped my cable, and I do plan on getting Hulu Plus instead, but you know what? If they stop putting current episodes on Hulu I'm just no...
  • David Manthos: The bill is actually HB 2551, not 2511. http://www.legis.state.wv.us/Bill_Status/Bills_history.cfm?input=2551&year=2016&sessiontype=RS&...

Your Account: