This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Former Gucci engineer accused of hacking into network and disrupting service

Share this article:

A 34-year-old man has been accused of remotely hacking into the Gucci network and shutting down servers after his employment was terminated.

According to a report by the Wall Street Journal, Sam Chihlung Yun worked at Gucci as a network engineer but after his employment was terminated he apparently remotely took over computers, shut down servers and deleted emails.

Prosecutors said that Yun created an account in the name of a fictional employee and used it to access the company's network after he was fired in May 2010. He is alleged to have caused more than $200,000 in diminished productivity, as well as remediation costs.

Manhattan district attorney Cyrus R. Vance Jr, said: “Computer hacking is not a game. It is a serious threat to corporate security that can have a devastating effect on personal privacy, jobs and the ability of a business to function at all.”

Adam Bosnian, EVP of Americas and corporate development at Cyber-Ark, said: “This case emphasises all too clearly the damage that can ensue from a failure to effectively lock down and defend the corporate network. While it may seem inconceivable that a global organisation such as Gucci would place its brand and reputation in jeopardy by failing to put the right security parameters in place, it is a situation which happens all too frequently.

“The granting of privileged access is unavoidable, but organisations can take precautions and implement solutions which monitor access to the network, thereby tracking any irregular activity and putting a stop to any anomalies before they turn into a corporate disaster.

“Ultimately, data is the lifeblood of an organisation and any firm that chooses to turn a blind eye to users' access to this data is potentially severing the corporate artery.  Organisations that do not want to suffer a similar fate would do well to take clear actions now to prevent history repeating itself.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...