Attacks/Breaches
12/1/2008
04:35 PM
50%
50%

Canadian IT Exec Accused Of Stealing Customer Database

Data on more than 3.2 million prospects could be worth more than $10 million

An IT manager of a Canadian direct marketing firm has been accused of absconding with a copy of the company's customer database.

According to a report in last week's Vancouver Sun, an affidavit filed with the British Columbia Supreme Court accuses Nick Belmonte, vice president of IT at C-W Group, of stealing a computer backup tape containing names and information about 3.2 million customers -- potentially worth more than $10 million. The tape also contained credit card and bank account information of more than 800,000 customers.

"The customer library could also potentially be marketed as a discrete asset with a value in the tens of millions of dollars," the affidavit said.

In her affidavit, C-W chief executive Gloria Evans recalled she became extremely concerned that Belmonte had recently ordered another employee to bring three backup tapes to his office, where he made copies. Only two tapes were found on Belmonte's desk. "The tape containing the customer library data was missing," the statement says.

Evans and another top executive, Brian Page, phoned Belmonte, who denied knowing anything about a third tape, according to the court documents. The CEO then changed the locks on the computer room and terminated off-site access to the company's computer system.

Although the information on the backup tape was encrypted, the tape contained information and programs that would allow a knowledgeable user to decrypt the data, the report states.

Page's statement in the court records suggests that Belmonte was a "problem employee" whose office attendance was irregular, who charged lunches with his friends to the company, and who had informed employees he would be leaving soon.

The court records include an e-mail sent by Belmonte at 1:05 a.m. on Nov. 5, saying he was on stress leave because he had been wrongly accused of theft.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.