Malicious Insider Makes Major Mistakes in Ubiquiti Extortion Caseby@isaac-kohen-teramind
449 reads
449 reads

Malicious Insider Makes Major Mistakes in Ubiquiti Extortion Case

by Isaac Kohen 6mJanuary 5th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In December 2020, technology company Ubiquiti found itself the victim of a ransomware attack. A software engineer on the company’s cloud team whose credentials had been used in the attack was a suspect in the case. He allegedly changed the logs from the attack to erase evidence of his involvement. Nickolas Sharp was arrested just a few months after the attack and may find himself spending the next 37 years in confinement. This story should serve as a warning for security teams thinking about how to prevent this kind of incident where a trusted member decides to abuse their privileges for malfeasance.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Malicious Insider Makes Major Mistakes in Ubiquiti Extortion Case
Isaac Kohen  HackerNoon profile picture
Isaac Kohen

Isaac Kohen

@isaac-kohen-teramind

Isaac Kohen is the VP of R&D of Teramind https://www.teramind.co

Learn More
LEARN MORE ABOUT @ISAAC-KOHEN-TERAMIND'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Isaac Kohen  HackerNoon profile picture
Isaac Kohen @isaac-kohen-teramind
Isaac Kohen is the VP of R&D of Teramind https://www.teramind.co

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite