Medco sys admin gets 30 months for planting logic bomb
Inside saboteur could have crippled pharmacists' ability to check for deadly drug interactions, U.S. attorney says
Computerworld - A former systems administrator at Medco Health Solutions Inc. was sentenced to 30 months in federal prison today for planting a logic bomb that could have taken down a corporate network that held customer health care information.
Yung-Hsun Lin, 51, of Montville, N.J., was sentenced in U.S. District Court in Newark, N.J. Lin, who faced a maximum of 10 years in prison, pleaded guilty to one count of computer fraud in September. He was responsible for programming and maintaining the servers at Medco, where he worked from 1997 to 2005.
The court also ordered Lin to pay $81,200 in restitution to the company, and to serve two years of supervised release after he completes his prison term. He was forbidden from working on computers during his prison time and supervised release as well.
This is believed to be the longest federal prison sentence for an attempted crime intended to damage a computer system, according to the U.S. Attorney's Office.
"This case is unique in that it touches on the public health system," Assistant U.S. Attorney Erez Liebermann told Computerworld. "Other logic bomb and intrusion cases have dealt mostly with money. Not to belittle that -- it's a very, very serious issue. But they hadn't risen to being a risk to human beings. ... A stiff sentence like this sends the message to companies that it's important to report these crimes, and when you do, the criminal justice system will take this seriously. When companies come forward with these crimes, it's worth their while, and if someone is caught, even in the attempt stage, they will get a stiff sentence."
The logic bomb, which was designed to delete "virtually all of the information" on about 70 Medco servers, was made up of malicious code that Lin wrote and planted in multiple scripts on the company network, according to court documents. It was designed to trigger at a certain time and date. That didn't happen, though. The first time the logic bomb was set to go off, a coding error kept it from working. And before the second time it was set to go off, one of Lin's own co-workers discovered the code hidden amidst a slew of other scripts and shut it down.
Finding the logic bomb was quite a feat, according to Liebermann, who called it a "sophisticated" attack. He explained that Lin used innocuous names to disguise the files holding the malicious code. He also went into the system's file properties and made it appear that they were old files and not something recently added that might need checking out.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts