Quantcast
PC World: Technology Advice You Can Trust
Find a Review
Free Newsletters
Receive the latest reviews, how-to's, news, and more.
WiFi Finder
Locate wireless services by a specific address, city, state, country, airport, or zip code.
RSS Feeds
Get our latest content via convenient RSS feeds.
Latest News
Today @ PC World
Become a PCW Member
Join the community and start enjoying the benefits:
  • Get tech advice from thousands of PC World Members
  • Rate and recommend the latest tech products
  • Share your thoughts in blog and article comments
  • Get free excerpts and exclusive discounts on Super Guides

Unix Admin Pleads Guilty to Planting Logic Bomb

A former Unix system administrator at Medco Health Solutions attempted to sabotage critical data, including individual prescription drug data, on more than 70 servers.

Jaikumar Vijayan, Computerworld

Friday, September 21, 2007 2:00 PM PDT
Recommend this story?

A former Unix system administrator at Medco Health Solutions Inc.'s Fair Lawn, N.J., office on Wednesday pleaded guilty in federal court to attempting to sabotage critical data, including individual prescription drug data, on more than 70 servers.

Yung-Hsun Lin, also known as Andy Lin, 51, of Montville, N.J., is scheduled to be sentenced on Jan. 8. He faces a maximum sentence of 10 years and a fine of US$250,000.

Lin was one of several systems administrators at Medco who feared they would get laid off when their company was being spun off from drug maker Merck & Co. in 2003, according to a statement released by federal law enforcement authorities. Apparently angered by the prospect of losing his job, Lin on Oct. 2, 2003, created a "logic bomb" by modifying existing computer code and inserting new code into Medco's servers.

The bomb was originally set to go off on April 23, 2004, on Lin's birthday. When it failed to deploy because of a programming error, Lin reset the logic bomb to deploy on April 23, 2005, despite the fact that he had not been laid off as feared. The bomb was discovered and neutralized in early January 2005, after it was discovered by a Medco computer systems administrator investigating a system error.

Had it gone off as scheduled, the malicious code would have wiped out data stored on 70 servers. Among the databases that would have been affected was a critical one that maintained patient-specific drug interaction information that pharmacists use to determine whether conflicts exist among an individual's prescribed drugs. Also affected would have been information on clinical analyses, rebate applications, billing, new prescription call-ins from doctors, coverage determination applications and employee payroll data.

During a plea hearing at the U.S. District Court in Newark, N.J., Lin pleaded guilty to one count of transmitting computer code with the intent of causing damage in excess of $5,000.

The case is one of the most egregious examples yet of attempted computer sabotage by an insider, Asst. U.S. Attorney Erez Liebermann told Computerworld. Unlike most malicious logic bombs, which are designed to disrupt operations or inflict financial damage, Lin's malicious code could have affected "life and limb," Liebermann said.

The incident highlights again the danger posed to companies by disgruntled employees seeking revenge for some perceived harm against them, Liebermann said. "Some event triggers unhappiness on the part of the employee, which is why we have counseled companies to be extra vigilant about hiring and firing staff" and when handing out incentives and bonuses, he said.

Liebermann pointed to the case of Roger Duronio, a systems administrator at UBS PaineWebber. In July 2006, Duronio was found guilty of planting a logic bomb that affected around 1,000 of PaineWebber's computers around the U.S., costing the company more than $3 million in damages. Duronio, who was sentenced to more than eight years in prison, planted the bomb because he was disgruntled with his pay and bonuses.

Tracking down such individuals can be challenging because of the techniques they use to hide their tracks, Liebermann said. In both the Duronio incident and in Lin's case, for instance, the malicious code was designed to wipe itself out of existence after the attack had been deployed, he said.


Computerworld
For more enterprise computing news, visit Computerworld. Story copyright © 2007 Computerworld Inc. All rights reserved.


Recommend this story?

Comments
Latest News
Storage firm claims 25 competitors violate its patents for removable flash in MP3 players and USB drives. 28-Oct-2007
Health care advocates say government support of electronic data can improve care and prevent errors. 28-Oct-2007
Today's Web businesses say they're building on a strong foundation and don't fear a bursting bubble. 28-Oct-2007
Kestrel, the next version of the desktop browser, fixes bugs synchronizes bookmarks between a PC and a handheld. 28-Oct-2007
China will expand the trial of TD-SCDMA technology to include the Beijing Olympics. 27-Oct-2007
Learn more about Office 2007 directly from Microsoft

Discover the redesigned, easier-to-use
2007 Microsoft Office system

PC World's Marketplace

PC World's Free Whitepapers

Name City
Address 1 State Zip
Address 2 E-mail (optional)