Vulnerabilities / Threats

4/14/2017
11:40 AM
50%
50%

Engineer Arrested for Attempted Theft of Trade Secrets

Software engineer Dmitry Sazonov has been arrested for trying to steal valuable code from his employer, a financial services firm.

The FBI has announced the arrest of software engineer Dmitry Sazonov, who was taken into custody for allegedly trying to steal valuable computer code from the financial services organization where he worked.

Sazonov, a native of New York's Rockland County, has been charged with one count of attempted theft of trade secrets, which carries a maximum sentence of 10 years in prison and maximum fine of $250,000, or twice the gross gain or loss from his crime.

The DoJ reports he allegedly took several steps to hide his theft of proprietary computer code for a trading platform, which his employer has been developing for five years.

"He researched and ultimately used the technique of steganography to hide the code within other PDF files like personal tax and immigration documents on his work computer," says FBI assistant director-in-charge William F. Sweeney Jr. "He also uploaded encrypted zip files to a third-party website to complete his heist."

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/14/2017 | 1:34:40 PM
Detection Mechanism?
What was the detection mechanism to discover how he was moving the code? DLP needs data indicators so I'm not so sure it would be able to create incidents based on the code. Also, certain platforms have difficulty scanning for steganography and encrypted files.
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
2018 on Track to Be One of the Worst Ever for Data Breaches
Jai Vijayan, Freelance writer,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1643
PUBLISHED: 2018-11-15
The Installation Verification Tool of IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure...
CVE-2018-0693
PUBLISHED: 2018-11-15
Directory traversal vulnerability in FileZen V3.0.0 to V4.2.1 allows remote attackers to upload an arbtrary file in the specific directory in FileZen via unspecified vectors.
CVE-2018-0694
PUBLISHED: 2018-11-15
FileZen V3.0.0 to V4.2.1 allows remote attackers to execute arbitrary OS commands via unspecified vectors.
CVE-2018-0695
PUBLISHED: 2018-11-15
Cross-site scripting vulnerability in User-friendly SVN (USVN) Version 1.0.7 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2018-0697
PUBLISHED: 2018-11-15
Cross-site scripting vulnerability in Metabase version 0.29.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.