Edward Soybel was let go by W. W. Grainger and subsequently hacked his way back into the company to access customer databases to destroy and corrupt the data. Credit: Thinkstock Edward Soybel, a former contractor for W.W. Grainger, Inc. maintained the computer servers for Grainger’s network of industrial vending machines from November 2014 through February 2016, when his services were terminated. Upon termination, Soybel, lost his trusted insider status — and his access to those Grainger servers.That didn’t stop him from getting back in, though.Soybel successfully hacked into the Grainger servers in July 2016 and gained unfettered access to the Grainger inventory management program that supports some 18,000 customers throughout the U.S. and intentionally damaged the data within, according to the Department of Justice indictment of Soybel.Soybel’s LinkedIn profile describes his position at Grianger as a Systems Analyst Level 2. His job description shows he was deeply involved with troubleshooting the various connectivity methodologies, as well as a plethora of databases and computer technologies. On the surface, the case looks rather simple. Soybel departed, and for whatever reason, he opted to extract a bit of revenge. Using his trusted insider knowledge, he successfully hacked back into his former employer’s infrastructure for the purpose of destroying and manipulating sensitive data.Interestingly, and perhaps coincidentally, Grainger announced Mark Lohman as the new CISO two days following the arraignment of Soybel. According to the Grainger press release announcing Lohman’s appointment, Lohman joined Grainger in 2014 as senior director of information security and business continuity. No doubt Lohman was intimately involved with pulling together the Grainger data provided to law enforcement in support of the Soybel indictment. The Grainger announcement highlights the need for companies to “prioritize vigilance and awareness to realize information security.” The press release further discusses how “Grainger plays an active role in securing sensitive data and our systems and enables Grainger to be a reliable and trusted partner.”What companies can learn from the Grainger hackAs with any instance when data flow is disrupted, a company is put at risk of not being able to provide goods and services as expected. When data is neither blocked nor stolen but corrupted, it creates a far different dynamic because corrupted data may have already been replicated across the backup servers, and only the “cold start” backups would not be corrupted, depending upon when the data was originally corrupted.In September 2015, then director of national intelligence, James Clapper, told Congress, “In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity. … Decision making by senior government officials, corporate executives, investors or others will be impaired if they cannot trust the information they are receiving.”While Clapper was speaking of the activities of nation states, the actions of Soybel show that a current or former trusted insider may be well placed to affect such a disruption. Thus it begs the question all IT employees should be asking themselves while reading of Soybel: Would the corruption of their or their customer’s data be detectible? And if not, what adjustments need to be made to detect the corruption of data? Related content news analysis China’s MSS using LinkedIn against the U.S. The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources. By Christopher Burgess Aug 31, 2018 4 mins Social Engineering Cybercrime Security news analysis Tesla insider with expired NDA spills the tech beans A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms. By Christopher Burgess Aug 30, 2018 3 mins Risk Management Security news analysis Horizon Air tragedy highlights airline insider threat vulnerability The ease at which a Horizon Air employee was able to steal and crash a Bombardier Q400 turboprop will likely prompt airlines to develop an insider threat mitigation strategy to close this vulnerability. By Christopher Burgess Aug 13, 2018 4 mins Security news analysis How did the TimeHop data breach happen? Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised. By Christopher Burgess Aug 10, 2018 4 mins DLP Software Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe