After being terminated from his job, he logged into McLane Advanced Technologies and wiped customer data At the Bikinis Sports Bar and Grill in Austin, Texas, you can get burgers and beer served to you by cute waitresses wearing denim shorts and bikini tops. And if you’re David Palmer, a recently fired IT worker, you can also break into a U.S. military contractor’s computer systems and wipe out payroll files, wreaking havoc at its customers.That’s exactly what Palmer did on Jan. 21, 2010. Angry that his former employer, McLane Advanced Technologies, had fired him and then refused to help him with an unemployment benefits claim he’d made to the Texas Workforce Commission, Palmer broke into McLane’s systems and deleted payroll files belonging to Lone Star Plastics, a McLane customer that makes polyethylene bags and can-liners. He also broke into a second McLane customer, Capstone Mechanical.[Also see Hackers steal security certificates for CIA, MI6, Mossad]“The only reason for logging into any of these servers was to create general havoc and disorder for McLane Advanced Technologies the following day,” Palmer told investigators, according to court records. The plan worked. When employees at Lone Star Plastics’ Prattville, Alabama, facility tried to punch in on the 21st, they discovered that the McLane server that hosted their punch clock software and payroll records had shut down. Two days later, McLane Advanced Technologies contacted the U.S. Secret Service, reporting that it had been hacked. More cybercrime PlayStation scam makes FBI warning list Man gets 6 years for hacking girls to extort photographs Fired techie creates virtual chaos at pharma company Palmer, formerly an IT administrator with the company, pleaded guilty to computer intrusion charges Thursday in U.S. District Court for the Western District of Texas. He’s set to be sentenced on Nov. 2.Prosecutors say that Palmer set up a back-door user account entitled “Palmer Lt” before being terminated by McLane at the end of 2009. That account was used to break into the Lone Star Plastics computer and was linked to other intrusions at McLane. Palmer had logged into it from a variety of locations, including his home address in Temple, Texas; Bikinis Sports Bar and Grill; and Buffalo Wild Wings in Waco, Texas.Disgruntled ex-employees seem to think they can cover their tracks by logging into their former employers from restaurant Wi-Fi networks. Two weeks ago a former IT staffer at the U.S. subsidiary of Japanese drugmaker Shionogi pleaded guilty to similar charges. He had logged in from a McDonalds.McLane Advanced Technologies sells supply chain management and IT services to the U.S. Department of Defense, state and local governments and large retailers such as Wal-Mart. The company declined to comment.Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert’s e-mail address is robert_mcmillan@idg.com Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe