IT contractor gets five years for $2M credit union theft
Insider threat case the second this week, following Terry Childs guilty verdict
Zeldon Morris, a Provo, Utah computer contractor, was sentenced on Wednesday to more than five years in prison after pleading guilty to stealing close to $2 million from four credit unions that he performed IT services for.
Judge Clark Waddoups of the U.S. District Court for the District of Utah also ordered Morris to repay more than $1.8 million in restitution to his victims and to submit to five years of supervised release upon completion of his prison term.
In December, Morris had pleaded guilty to using his privileged computer access to steal money from Family First Federal Credit Union, Alpine Credit Union, Deseret First Credit Union, and First Credit Union.
News of Morris' sentencing came just one day after former San Francisco network administrator Terry Childs was found guilty on charges of locking up a key city network for days in 2008.
Childs' actions resulted in city officials losing administrative control of the network for more than 10 days. It also resulted in the city having to spend hundreds of thousands of dollars recovering from the disruption.
Both are examples of what security analysts have long said is the often under-estimated and overlooked danger posed by rouge insiders.
Morris was employed as a third-party contractor by Open Source Solutions Inc, a computer services firm in Provo. In that capacity, Morris was supposed to help the four credit unions upgrade their systems. As part of his job, he was given unrestricted local and remote access to the networks at the credit unions.
Morris used his access to initiate several fictitious Automated Clearing House (ACH) transactions, according to court documents describing the thefts at Family First Federal Credit Union. The transfers were deposited into bank accounts that Morris owned, including a business account that he operated jointly with a business partner.
Morris used fictitious or previously used ACH "racing numbers" to make the deposits into his accounts, court documents said.
In his guilty plea, Morris said that it was his "specialized knowledge" of the systems at the financial institutions that allowed him to pull off the thefts for about two years without being detected.
The money that was falsely transferred into Morris' account was later used to pay mortgage on two homes, pay off his car loans, and for repairs to his properties as well as for overseas vacations.
In all Morris admitted to stealing about $1.2 millions from First Family, about $82,000 from Alpine, about $635,000 from Deseret and $93,000 from First Credit.
According to court documents the thefts are likely to have gone unnoticed for some time if it had not been for Morris' partner who alerted Family First of unusually large ACH deposits being made into the joint business account.
The case is similar to countless others involving theft, sabotage and data compromise by insiders with privileged access to enterprise systems and networks. Security researchers have long maintained that rogue insiders pose a potentially greater threat than external hackers.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- University of North Florida breach exposes data on 107,000 individuals
- Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
- GAO slams White House for failing to lead on cybersecurity
- Man charged with attack on Web site of Fox News' Bill O'Reilly
- Heartland breach expenses pegged at $140M -- so far
- IT contractor gets five years for $2M credit union theft
- Democracy would suffer if Google left China, says MIT panel
- Gonzalez accomplice gets five years for hacking TJX
- Threat of cyberattacks from overseas high, federal IT execs say
- Botnets 'the Swiss Army knife of attack tools'
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts