Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

A former system administrator for PA Online was issued a prison sentence of two years, alongside a fine of $26,000, for using the company network when he wasn’t supposed to. Dariusz J. Prugar, who had been fired just days before the incident, found that his credentials were still valid. He then proceeded to cause the network to crash, leaving countless residents and Pennsylvania businesses without an Internet connection.

Prugar used these credentials to infiltrate the network and steal back software which he claimed was rightfully his. He continued to plant backdoors across the network, and to keep his antics hidden, Prugar enabled scripts that would delete the network’s access logs.

However, the results of this action were far from the intended purpose. The scripts used by Prugar caused the entire system to crash, which led to the company calling Prugar in to assist with getting the systems back online. He then made the mistake of demanding to renegotiate the rights to “his” software, which was a major red flag for PA Online. The ISP called in the FBI to investigate the occurrence, and… well, you know the rest.

The end result was that PA Online’s customers went a week without an Internet connection, and the company eventually had to shut itself down. The effects of a rogue admin led to the demise of the ISP, and it’s only because this former employee still had his own credentials to access the company network.

There is a clear lesson to be learned here; a user who doesn’t need access to your network shouldn’t be able to do so. Often times, an employee who gets terminated or leaves the company for some reason may do so with their credentials intact, and in the confusion of losing a worker, your IT department may forget to revoke their access to the network. Enforcing this practice will help you avoid a premature failing due to a situation similar to what happened to PA Online.

Evolve IT is the ideal solution to these system access problems, as we can monitor your network access in real time for discrepancies, as well as restrict permissions as the need arises. You can know for certain that any users who aren’t currently employed by your business won’t have credentials to access the network. To learn more, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office Operating System Backup Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Microsoft Office Firewall Wireless Technology Content Filtering Android Cybercrime Website Apple Best Practice Alert Employer-Employee Relationship Networking Data storage History Two-factor Authentication Windows Data Small Business Experience Phishing App Mobile Computing Big Data communications Safety Unified Threat Management Mobile Device Management Money Network Smartphones Quick Tips Managed Service Provider Outlook Windows XP IT Services Managed IT services Remote Computing Shortcut Hosted Solution Artificial Intelligence Documents DDoS Heating/Cooling Word Tech Support Compliance Bluetooth Drones Social Automation Business Management Printer Browser Virtual Desktop Wireless Memory Competition Unified Communications Securty Deep Learning Presentation Entrepreneur Document Management Encryption Law Enforcement SaaS VoIP BDR Domains Cortana Vendor Management Hacker Proactive IT Network Congestion Application Save Money Monitors Customer Service Music Cryptocurrency Laptop IBM Displays Router Google Docs Education Office 365 Cleaning Holiday YouTube Processors End of Support Analytics Black Market Saving Money Office Tips intranet LiFi Staffing Lithium-ion battery BYOD Downtime Streaming Media Help Desk Writing Passwords Micrsooft Social Networking Visible Light Communication Disaster Public Speaking Data Management IP Address Virtualization Business Growth Robot Advertising Recovery Government Society Sports Spam Retail Augmented Reality Keyboard Google Wallet Information Technology Running Cable Search User Hard Drives Windows 8 Internet of Things
QR-Code