Feeds

Pink-slipped sysadmin admits to threatening ex-employer's network

Breaking up is hard to do

SANS - Survey on application security programs

A system administrator has admitted he threatened to cause extensive damage to his former employer's computer system after he was laid off.

Viktor Savtyrev, 29, of Old Bridge, New Jersey, worked as a sysadmin for five years at an unnamed mutual fund company located in New York City that managed more than $15bn, according to court documents.

A day after he and 13 other employees were laid off, he sent the firm's general counsel an email that threatened to unleash devastating attacks on the network unless his demands were met for additional severance pay and health insurance.

"My comrades for a small fee are able to help me out with bridging firewall security and carry out data destruction and virus outbreak," he wrote in the email dated November 6. "And lucky me to find out that [the company's firewall] is the cheapest firewall to crack!"

The rogue employee went on to threaten a barrage of nasty press if the managers did not comply.

"I located the names and email addresses of editors of Wall Street Journal, Newsweek, and Daily News, and all of them should be very interested in getting an article about a mutual fund loosing [sic] data because some 'Crazy Russian' (this is the name of the article which I wrote last night), was fired after 5 years of loyal service," he added. "And that will give a very good marketing and advertisement campaign, I am sure clients would be reading it too."

He went on to demand that "excellent references should be provided for anybody contacting you regarding my employment."

Savtyrev entered a guilty plea on Monday in federal court in New Jersey. He faces a maximum sentence of five years in prison and a $250,000 fine. He has also agreed to pay restitution. Sentencing is scheduled for August 24. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.