Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns Cyber Risk

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns

  • William Rimington
    William Rimington WilliamRimington
  • Kevin Wong Kevin Wong
  • Ben Hawkins Ben Hawkins

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns

In 2019, Kroll, a division of Duff & Phelps, was engaged to assist a media company in the UK who suspected its information technology manager (the IT manager) of fraud. Kroll’s investigation involved digital forensic analysis of the IT manager’s corporate computer and mobile phone.

On these devices, Kroll found evidence that the IT manager was selling large quantities of electronic equipment on online market forums. These were then reconciled against large purchase orders, which were paid for using the company funds. It is estimated that the IT manager had defrauded the company of hundreds of thousands of pounds throughout his employment.

The client was concerned by the IT manager’s motivation as he had been a trusted member of the organization for a long time and received a substantial salary. After forensically examining the mobile phone, it became apparent that the IT manager had a lavish lifestyle, which included indulging in several illegal activities, raising further questions around his behavior and integrity.   

Intellectual Property and Sensitive Data Concerns

Once Kroll reported its findings relating to the sale of electronic equipment and the apparent lifestyle of the IT manager to the client, additional concerns were raised whether the IT manager had potentially stolen intellectual property from the company to sell to a competitor. If this had transpired, was the company's personally identifiable information (PII) also taken, leading to a potential GDPR reporting requirement and notification to the Information Commissioner’s office? Kroll conducted a further review of the devices, searching for evidence of the removal of sensitive intellectual property and PII data, which may have left company systems via common methods such as email, cloud storage, file transfer and removable USB media. Kroll was able to inform the client that no evidence of the loss of sensitive intellectual property or PII data was found, removing the concern that regulatory notification may have been required.

The client asked Kroll to prepare an evidential package to assist law enforcement in prosecuting the IT manager. Working together with law enforcement, the weight of evidence was such that the IT manager had no choice but to plead guilty to fraud at court. The judge issued a substantial custodial sentence.

Insider threats are often overlooked in most organizations’ risk assessments, given the propensity to inherently trust employees as a natural part of running successful operations. It can, however, have a significant impact, including financial loss, intellectual property theft or regulatory fines for PII loss. Like all business risk, insider threats can be managed by ensuring there is a balance of the right controls around people, process and technology. Trust and empowerment must be attached to the ways and means to hold responsible employees accountable for their actions.

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns 2020-05-08T00:00:00.0000000 /en/insights/publications/cyber/insider-threat-digital-forensics-fraud-regulatory-concerns /-/media/kroll/images/publications/featured-images/2019/insider-threat-digital-forensics-fraud-regulatory-concerns.jpg publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {41C2B883-4E8E-4CB3-8774-5F5B9AEC0582} {C93B6EB0-4997-4312-946E-FEAC23A47496} {B6B1E0A3-F842-4166-A1FC-FABA37190FE5}

Insights

The Monitor

Telerik Vulnerability (CVE-2019-18935) Creates Surge in Web Compromise and Cryptomining Attacks - The Monitor, Issue 14

The Monitor
Cyber Risk

Case Study – Protecting the 2008 U.S. Presidential Election from Cyber Attacks

Cyber Risk
Cyber Risk

KAPE 0.9.2.0 Released: New Target and Module Definition Changes

Cyber Risk
Cyber Risk

Protecting Elections: Security Beyond the Machine

Cyber Risk