Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:19 AM
Dark Reading
Dark Reading
Quick Hits

Insiders, After a Fashion

Employees of a fashion trade show operation accused of hacking company data to build a side business of their own

Two employees of a company that runs trade shows for the fashion industry were arrested this week when they were discovered to be building a side business using stolen company information. Jeffrey White and Morgan Gantt face charges arising out of an alleged scheme to hack into a computer network belonging to ENK International LLC, which coordinates fashion trade shows. The two are being held by the FBI.

ENK terminated White's employment in July, followed by Gantt on Aug. 21, after ENK management discovered she was operating -- during her work hours and using ENK resources -- a temporary employment agency targeting exhibitors at fashion shows. As Gantt was preparing to leave ENK's offices on the day she was fired, ENK management saw her remove a portable USB computer storage drive from her ENK computer. Gantt allegedly refused to turn over or show the contents of the USB drive and left the office.

A forensic analysis was conducted of the contents of Gantt's ENK Blackberry -- which she did surrender on the day she was terminated -- as well as the computer she used during the course of her employment at ENK. The analysis revealed a series of text messages between Gantt and White on Aug. 13, in which White instructed Gantt to access and send certain ENK electronic documents to White's personal e-mail address. The analysis confirmed that Gantt had sent those documents on the same day.

As it turned out, the documents contained information relating to more than 440 retail buyers who had been scheduled to attend ENK's trade shows in July, and the names and other information relating to 500 people who attended ENK's shows. Access to these documents could give ENK's competitors a considerable advantage with respect to fashion industry clients, the FBI said.

The forensic analysis revealed another series of text messages between Gantt and White around Aug. 15, in which White instructed Gantt to download confidential ENK files to a USB storage device. An analysis of Gantt's ENK computer revealed she had downloaded those files, which contained sensitive information relating to ENK's trade show business.

White and Gantt are charged with one count of conspiracy to commit unauthorized computer access, and one count of conspiracy to commit theft of trade secrets. If convicted, the defendants each face a maximum sentence of 11 years in jail.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...