by bovem on 6/12/24, 6:58 PM with 88 comments
by glonq on 6/12/24, 7:41 PM
This is why you don't force employees or contractors to work through their final two weeks. Too little benefit, too much risk.
> After Kandula's contract was terminated and he arrived back in India, he used his laptop to gain unauthorised access to the system using the administrator login credentials. He did so on six occasions between Jan 6 and Jan 17, 2023.
Oh nevermind, it's far worse than just that!
by xyst on 6/12/24, 8:02 PM
Worked with a number of folks that caused much more than that just by mere accident. Not disgruntled or anything. Just “fat fingered” a command or had a momentary brain fart (deleted prod db instead of backup!).
Guy truly was incompetent and deserves everything coming to him.
by rkwz on 6/12/24, 8:08 PM
> The system that Kandula’s former team was managing was used to test new software and programs before launch. In a statement to CNA on Wednesday, NCS said it was a "standalone test system".
> As a result of his actions, NCS suffered a loss of S$917,832.
Wondering if these are CI/CD pipelines, and how the loss amount was calculated since these can be spun up again.
by TacticalCoder on 6/12/24, 7:41 PM
by technick on 6/12/24, 8:07 PM
NCS sounds like a clown show based on this article. The administrator credentials should have been changed as soon as Kandula was let go. Ideally, these credentials shouldn't have ever been used and everyone should be acting as themselves with a elevated privilege step.
As for the $678k in damages, why didn't NCS have snapshots that they could have quickly restored? Sounds like their BCDR plans need to be reviewed and updated.
Moral of the story is don't do business with NCS.
by paulpauper on 6/12/24, 7:30 PM
full disk encryption is a thing. it's amazing how people who are otherwise technically competent leave such obvious incrementing evidence on computer
by InfiniteVortex on 6/12/24, 7:52 PM
by rekabis on 6/13/24, 4:56 AM
> NCS is a company that offers information communication and technology services.
And more importantly, this:
> After Kandula's contract was terminated and he arrived back in India, he used his laptop to gain unauthorised access to the system using the administrator login credentials. He did so on six occasions between Jan 6 and Jan 17, 2023.
The company is not just ignorant, but massively incompetent.
You don’t fire someone without totally withdrawing every last shred of access they have. The fact that he was able to use a common, generic administrative credential shows that NCS fails epically at even the simplest of security.
by banku_brougham on 6/12/24, 8:06 PM
by ssahoo on 6/14/24, 6:05 AM