Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Ex-IT Chief Busted for Hacking

Could former security-privileged employees be targeting your environment as well?

Stevan Hoffacker, formerly director of IT and VP of technology for Source Media, was arrested at his home yesterday on charges of breaking into the email system that he once managed.

According to the FBI and the U.S. Attorney for the Southern District of New York, Hoffacker hacked into his former company's messaging server, eavesdropped on top executives' emails about employees' job status, and then warned the employees that they were about to lose their positions.

Hoffacker, 53, is charged with one count of unauthorized access to a protected computer network. If convicted, he faces a maximum sentence of five years in prison and a $250,000 fine.

According to the law enforcement agencies, Hoffacker was with Source Media -- a 1,000-employee firm that publishes financial market information -- from 1998 to 2003. But between August and September 2006, Hoffacker allegedly monitored confidential messages about impending personnel moves, then used an anonymous Yahoo mail account to warn two of the affected employees.

Hoffacker was linked to the incidents via the Yahoo account, which he owned, and by computer forensics which indicate that Hoffacker had hacked into his old mail system before the incidents occurred. The FBI did not say exactly how Hoffacker broke into the mail system, but it noted that the former IT exec had access to the passwords for the email accounts of other Source Media employees.

The arrest could serve as a warning to other companies where high-ranking IT executives have access to a broad range of security privileges. In his recently published book, Enemy at the Water Cooler, ArcSight Inc. CSO Brian Contos described a situation in which an IT employee hacked into other employees' email accounts in order to find out whether his girlfriend was having an affair with a co-worker.

"Insiders have two things that external attackers don't: trust and access," Contos observes. Although Hoffacker's accounts likely were disabled when he was terminated from Source Media, he had access to sensitive data files, he says.

"He could have used a number of mechanisms to steal passwords while employed," Contos notes. "Something as simple as installing a basic keylogger or running password cracking tools against a password file could have resulted in everything he needed to know in a very short time, and would have likely slid under the radar of most security controls."

A recent study by the Ponemon Institute found that 78 percent of the organizations surveyed had experienced at least one insider security breach that was not publicly disclosed.

The bottom line is that organizations should be watchful of suspicious activity by privileged users -- even those who are no longer with the company, experts say.

"An effective monitoring strategy that leverages preventative controls and is backed by executive support is necessary for any effective insider threat mitigation program," says Contos.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-20
** DISPUTED ** The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access ...
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.