This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Former Gucci engineer accused of hacking into network and disrupting service

Share this article:

A 34-year-old man has been accused of remotely hacking into the Gucci network and shutting down servers after his employment was terminated.

According to a report by the Wall Street Journal, Sam Chihlung Yun worked at Gucci as a network engineer but after his employment was terminated he apparently remotely took over computers, shut down servers and deleted emails.

Prosecutors said that Yun created an account in the name of a fictional employee and used it to access the company's network after he was fired in May 2010. He is alleged to have caused more than $200,000 in diminished productivity, as well as remediation costs.

Manhattan district attorney Cyrus R. Vance Jr, said: “Computer hacking is not a game. It is a serious threat to corporate security that can have a devastating effect on personal privacy, jobs and the ability of a business to function at all.”

Adam Bosnian, EVP of Americas and corporate development at Cyber-Ark, said: “This case emphasises all too clearly the damage that can ensue from a failure to effectively lock down and defend the corporate network. While it may seem inconceivable that a global organisation such as Gucci would place its brand and reputation in jeopardy by failing to put the right security parameters in place, it is a situation which happens all too frequently.

“The granting of privileged access is unavoidable, but organisations can take precautions and implement solutions which monitor access to the network, thereby tracking any irregular activity and putting a stop to any anomalies before they turn into a corporate disaster.

“Ultimately, data is the lifeblood of an organisation and any firm that chooses to turn a blind eye to users' access to this data is potentially severing the corporate artery.  Organisations that do not want to suffer a similar fate would do well to take clear actions now to prevent history repeating itself.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Microsoft warns on yet another zero-day security flaw

Microsoft warns on yet another zero-day security flaw

Microsoft has warned Windows users about a zero-day security issue with malicious PowerPoint documents being emailed to recipients. The software giant is working on a patch for the problem.

Google launches FIDO-compliant 2FA USB key for Chrome and Gmail

Google launches FIDO-compliant 2FA USB key for Chrome ...

Google has souped up its two-factor authentication (2FA) login process with the launch of Security Key, a physical USB that only works after verifying the login site is truly a ...

Evolving TorrentLocker ransomware generating big money

Evolving TorrentLocker ransomware generating big money

The TorrentLocker ransomware has returned with a vengeance and is starting to bring in big money for its operators.