Attacks/Breaches
12/1/2008
04:35 PM
Connect Directly
RSS
E-Mail
50%
50%

Canadian IT Exec Accused Of Stealing Customer Database

Data on more than 3.2 million prospects could be worth more than $10 million

An IT manager of a Canadian direct marketing firm has been accused of absconding with a copy of the company's customer database.

According to a report in last week's Vancouver Sun, an affidavit filed with the British Columbia Supreme Court accuses Nick Belmonte, vice president of IT at C-W Group, of stealing a computer backup tape containing names and information about 3.2 million customers -- potentially worth more than $10 million. The tape also contained credit card and bank account information of more than 800,000 customers.

"The customer library could also potentially be marketed as a discrete asset with a value in the tens of millions of dollars," the affidavit said.

In her affidavit, C-W chief executive Gloria Evans recalled she became extremely concerned that Belmonte had recently ordered another employee to bring three backup tapes to his office, where he made copies. Only two tapes were found on Belmonte's desk. "The tape containing the customer library data was missing," the statement says.

Evans and another top executive, Brian Page, phoned Belmonte, who denied knowing anything about a third tape, according to the court documents. The CEO then changed the locks on the computer room and terminated off-site access to the company's computer system.

Although the information on the backup tape was encrypted, the tape contained information and programs that would allow a knowledgeable user to decrypt the data, the report states.

Page's statement in the court records suggests that Belmonte was a "problem employee" whose office attendance was irregular, who charged lunches with his friends to the company, and who had informed employees he would be leaving soon.

The court records include an e-mail sent by Belmonte at 1:05 a.m. on Nov. 5, saying he was on stress leave because he had been wrongly accused of theft.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.