The FBI has issued a warning that employees - and ex-employees - with a grudge are now using cloud resources and other leading edge technologies to hack into the IT systems of their employers and ex-employers.
It says that it has noticed staffers using advanced IT resources to get their own back on employers with who they are unhappy with.
Interestingly, the methodologies used can appear quite benign, says the FBI and its sister agency, the US Department of Homeland Security. For example, a former member of staff could use Dropbox to exfiltrate data out of a company, and then use this as a commercial advantage when they join another business.
"The exploitation of business networks and servers by disgruntled and/or former employees has resulted in several significant FBI investigations in which individuals used their access to destroy data, steal proprietary software, obtain customer information, purchase unauthorised goods and services using customer accounts, and gain a competitive edge at a new company," says the FBI analysis of the problem.
"Additionally, multiple incidents were reported in which disgruntled or former employees attempted to extort their employer for financial gain by modifying and restricting access to company Web sites, disabling content management system functions, and conducting distributed denial of service attacks," says the US agency.
To counter the problem, the FBI has produced a list of safeguards that include the conducting of a regular review of employee access and termination of any account that individuals do not need to perform their daily job responsibilities.
Employers should also consider ensuring third party service companies providing email or customer support know that an employee has been terminated, as well as restricting Internet access on corporate computers to cloud storage websites.
The FBI has helped to publish an advisory guide entitled `Combating the Insider Threat.'
Peter Wood, CEO of pen-testing specialist First Base Technologies, said the problem of rogue employees is an issue which most companies he deals with are potentially vulnerable.
"It's a massive challenge to beat this problem," he said, adding that one solution would be to use a two-stage protection system for defending critical company data, and for only one of those protections needing to be revoked to effectively block access to the data.
"If you have proper PKI security enabled, then it's a relatively easy task to revoke access when someone leaves. This provides you with what is clearly an extra later of security," he explained.
Wood went on to say that he advises clients - where appropriate - to use a belt and braces approach to security, so that, if one step fails - for whatever reason - the second layer of security mans that all is not lost.
"These sort of security systems can be tricky to set up, but once they are, everything can automated, with HR handling the required settings," he explained.