Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Societe Generale Goat Gets IT Consulting Job

Man who singlehandedly cost financial services firm more than $7B is now giving advice

The man who caused one of the worst security breaches in the history of the world now has a new job: He's an IT consultant.

Jerome Kerviel is accused of breaking into computer systems to make risky trades that cost Société Générale more than $7.7 billion. Now, he's working at Lemaire Consultants & Associés, a consultancy specializing in IT network installation and security, according to a Wall Street Journal report.

Kerviel started his new gig weeks ago, shortly after his release from more than a month in prison, according to his lawyer. An LCA employee confirmed Kerviel works for the firm, but declined to discuss the nature of his employment.

Kerviel violated a number of security policies and broke through multiple layers of security in order to gain the access he needed to make huge financial trades that ended up losing money for the bank. He did not profit personally from the deals, but said he was only trying to help the bank. (See Societe Generale: How Did It Happen?)

Accounts of Kerviel's maneuvering won him admiration by Internet fans who hailed him as a "Robin Hood" and a genius worthy of the Nobel Prize in economics.

Kerviel landed his job at LCA thanks to his legal team, according to his spokesman, Christophe Reille. One lawyer introduced him to LCA founder Jean-Raymond Lemaire, who hosted Kerviel at his house when the trading scandal erupted and journalists tried to track down the former trader. Lemaire then offered Kerviel a job as an IT consultant, Reille said.

A bank spokeswoman said Kerviel has been formally dismissed. Reille said the trader's lawyers are contesting his dismissal from the bank.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11107
PUBLISHED: 2020-04-02
An issue was discovered in XAMPP before 7.2.29, 7.3.x before 7.3.16 , and 7.4.x before 7.4.4 on Windows. An unprivileged user can change a .exe configuration in xampp-contol.ini for all users (including admins) to enable arbitrary command execution.
CVE-2020-11444
PUBLISHED: 2020-04-02
Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect Access Control.
CVE-2020-7617
PUBLISHED: 2020-04-02
ini-parser through 0.0.2 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of Object.prototype using a '__proto__' payload.
CVE-2020-8835
PUBLISHED: 2020-04-02
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the intr...
CVE-2020-8423
PUBLISHED: 2020-04-02
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.