Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

A former system administrator for PA Online was issued a prison sentence of two years, alongside a fine of $26,000, for using the company network when he wasn’t supposed to. Dariusz J. Prugar, who had been fired just days before the incident, found that his credentials were still valid. He then proceeded to cause the network to crash, leaving countless residents and Pennsylvania businesses without an Internet connection.

Prugar used these credentials to infiltrate the network and steal back software which he claimed was rightfully his. He continued to plant backdoors across the network, and to keep his antics hidden, Prugar enabled scripts that would delete the network’s access logs.

However, the results of this action were far from the intended purpose. The scripts used by Prugar caused the entire system to crash, which led to the company calling Prugar in to assist with getting the systems back online. He then made the mistake of demanding to renegotiate the rights to “his” software, which was a major red flag for PA Online. The ISP called in the FBI to investigate the occurrence, and… well, you know the rest.

The end result was that PA Online’s customers went a week without an Internet connection, and the company eventually had to shut itself down. The effects of a rogue admin led to the demise of the ISP, and it’s only because this former employee still had his own credentials to access the company network.

There is a clear lesson to be learned here; a user who doesn’t need access to your network shouldn’t be able to do so. Often times, an employee who gets terminated or leaves the company for some reason may do so with their credentials intact, and in the confusion of losing a worker, your IT department may forget to revoke their access to the network. Enforcing this practice will help you avoid a premature failing due to a situation similar to what happened to PA Online.

Evolve IT is the ideal solution to these system access problems, as we can monitor your network access in real time for discrepancies, as well as restrict permissions as the need arises. You can know for certain that any users who aren’t currently employed by your business won’t have credentials to access the network. To learn more, reach out to us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 13 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware Hacking WiFi Bandwidth Facebook Microsoft Office Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Smartphones Alert Employer-Employee Relationship Networking Two-factor Authentication Data storage History Windows Small Business Data Phishing Experience App Mobile Computing communications Big Data Safety Mobile Device Management Unified Threat Management Money Network Quick Tips Managed Service Provider Outlook Firewall Wireless Technology Content Filtering Cybercrime Android Website Apple Best Practice Network Congestion Application Save Money Customer Service Music Retail Cryptocurrency Laptop Router IBM Office 365 Google Docs Managed IT services Education Cleaning Holiday YouTube Saving Money Processors Analytics Black Market Lithium-ion battery Office Tips Bluetooth LiFi intranet Staffing BYOD Downtime Automation Streaming Media Help Desk Passwords Micrsooft Memory Visible Light Communication Social Networking Disaster Public Speaking Deep Learning Virtualization Data Management IP Address Business Growth Robot BDR Advertising Recovery Society Government Sports Vendor Management Keyboard Spam Augmented Reality Google Wallet Search User Information Technology Running Cable Hard Drives Windows 8 Internet of Things Monitors Shortcut Windows XP IT Services Remote Computing Hosted Solution DDoS Artificial Intelligence Documents Heating/Cooling Tech Support Word Compliance Displays Drones Social Printer Business Management Browser End of Support Virtual Desktop Wireless Competition Unified Communications Securty Presentation Document Management Entrepreneur Encryption Law Enforcement Writing SaaS VoIP Domains Cortana Hacker Proactive IT
QR-Code