Attacks/Breaches
12/1/2008
04:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Canadian IT Exec Accused Of Stealing Customer Database

Data on more than 3.2 million prospects could be worth more than $10 million

An IT manager of a Canadian direct marketing firm has been accused of absconding with a copy of the company's customer database.

According to a report in last week's Vancouver Sun, an affidavit filed with the British Columbia Supreme Court accuses Nick Belmonte, vice president of IT at C-W Group, of stealing a computer backup tape containing names and information about 3.2 million customers -- potentially worth more than $10 million. The tape also contained credit card and bank account information of more than 800,000 customers.

"The customer library could also potentially be marketed as a discrete asset with a value in the tens of millions of dollars," the affidavit said.

In her affidavit, C-W chief executive Gloria Evans recalled she became extremely concerned that Belmonte had recently ordered another employee to bring three backup tapes to his office, where he made copies. Only two tapes were found on Belmonte's desk. "The tape containing the customer library data was missing," the statement says.

Evans and another top executive, Brian Page, phoned Belmonte, who denied knowing anything about a third tape, according to the court documents. The CEO then changed the locks on the computer room and terminated off-site access to the company's computer system.

Although the information on the backup tape was encrypted, the tape contained information and programs that would allow a knowledgeable user to decrypt the data, the report states.

Page's statement in the court records suggests that Belmonte was a "problem employee" whose office attendance was irregular, who charged lunches with his friends to the company, and who had informed employees he would be leaving soon.

The court records include an e-mail sent by Belmonte at 1:05 a.m. on Nov. 5, saying he was on stress leave because he had been wrongly accused of theft.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.