Programmer steals Wall Street trading code, FBI alleges
Sources confirm Sergey Aleynikov worked at Goldman Sachs
Computerworld - A high-level developer for Goldman Sachs was arrested by the FBI Friday and charged with stealing computer code that automates the firm's high-volume trading on stock and commodities markets, according to court documents and sources close to the case.
The Reuters news service, which broke the story yesterday, tied the developer, Sergey Aleynikov, to Goldman Sachs, where he was allegedly a vice president of equity strategy.
Today, sources with knowledge of the case confirmed that Aleynikov had worked for Goldman Sachs for the last two years, and allegedly tried to steal code from the company.
In the days before his June 5 resignation from Goldman Sachs, Aleynikov copied, encrypted and transferred approximately 32MB of proprietary code to a server located in Germany, the FBI claimed in the complaint filed July 4 by Special Agent Michael McSwain, a member of the agency's securities fraud squad.
Aleynikov resigned to take a job with a new company "that intended to engage in high-volume automated trading," for triple his $400,000 salary, the complaint said.
McSwain spelled out four data transfers from Aleynikov's workstation -- both locally and remotely -- on June 1, June 4 and June 5, then tied the dates and times to Aleynikov's use of his keycard to access the office, or logging in remotely from his home computer.
Aleynikov tried to cover his tracks, alleged McSwain. "The program used to encrypt the files was then erased," the FBI agent swore in the complaint. "An attempt was also made to erase the bash history, which was unsuccessful, because of a feature of the Financial Institution's computer system that retains a back-up copy of each user's bash history."
A "bash history" is a log of the most-recently-executed commands by a user on a Unix-based operating system.
The FBI arrested Aleynikov late Friday night at the Newark Airport, and charged him with theft of trade secrets and transporting stolen property.
The complaint said that Aleynikov had made a statement after his arrest, admitting that he had copied and encrypted files from his company's servers, then transferred them to the remote server, deleted the encryption software and attempted to erase the bash history. "Aleynikov claimed, however, that he only intended to collect 'open source' files on which he had worked, but later realized that he had obtained more files than he had intended," McSwain said.
Before sources confirmed that Aleynikov worked for Goldman Sachs, Reuters had used facts in the FBI's complaint to match a LinkedIn profile for someone named "Serge Aleynikov," including his May 2007 start date and the description of his job. In the complaint, for example, McSwain said Aleynikov worked as a computer programmer on a platform that "allows the Financial Institution to engage in sophisticated, high-speed, and high-volume trades on various stocks and commodities markets."
In the LinkedIn profile, meanwhile, Aleynikov notes his position with Goldman Sachs and says he "lead development of a distributed real-time co-located high-frequency trading (HFT) platform" at the firm.
As of 2:30 p.m. ET Monday, Aleynikov was still being held in federal custody, pending bail. A Saturday hearing had set bail at $750,000, and placed both travel restrictions and computer access limitations on him assuming he posts a bond. A spokeswoman for the U.S. Attorney in the Southern District of New York declined to comment further on the case.
Goldman Sachs also declined to comment today.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts