BOFH: The revenge

It's amazing what people will fall for


Episode 17

>SQUEAK<

...

"Impressive," our recent ex-new-Boss says nervously, edging towards the back of the room. "How did you... find us?"

"Simple," the PFY says, entering from the door behind him, cattleprod in hand. "One of the laptops you took wasn't exactly what it looked like."

"Bitlocker?" the ex-new-technician asks, halting his in-tandem retreat along with the ex-Boss.

"No," I respond, fingering my own modded prod. "The machine had built in wireless and GPS and used scripted netstumbler to peer with any access points it could find and report its location."

"Really?" the ex-boss asks.

"Nah, the PFY lifted your wallet the day you started and stole your credit card details and personal information. We followed you here from your home."

"Ah," the ex-Boss says. "Which was why I found my wallet on the floor behind my desk last week."

"Indeed. Why steal a wallet when the cards would be deactivated within the day? No, it's far better that you feel you mislaid it for a moment and give us the opportunity to order a month's worth of crap to be delivered to your home."

"Crap?"

"Gym gear, PC games, porn, and diet products."

"Ah," the ex-Boss says knowingly. "All stuff which is very hard to return..."

"And you might have made donations to a number of internet based organisations with anti-democratic viewpoints – so I wouldn't do any flying in the near future."

"Either of you," the PFY says nodding at the ex-technician. "Those messages you were posting about Western infidels are almost certainly being read by anonymous men in a grey building somewhere in the city..."

"Which is why returning home is probably not your best option," I add.

"Not with the three sacks of fertiliser under your stairwell anyway..." the PFY adds.

"I..."

"Have our equipment and are only too willing to give it back to avoid a nasty incident?" the PFY asks.

"Yes?" the ex-technician suggests.

"And compensate us for our time with a couple of hundred quid?" the PFY adds.

"Fifty," the ex-Boss says.

"Each," the PFY counters.

"Done!"

And a deal is struck. Being consummate professionals they know a lost cause when they see it. Moments later the PFY and I have keys to a North London lockup, a little cash, and an agreement that the company will have learned some valuable lessons from the incident.

"So how did you manage to get the gear out so quickly?" the PFY asks as we have a post-truce pint with the ex-Boss and ex-tech.

"We got some magnetic signs made for a fake PC repair company then slapped them on a rental van," the ex-tech explains.

"Then we got a couple of lab coats, a clipboard, and started loading up gear. Amazing what people will fall for."

"And security didn't say anything?" the PFY asks.

"Nothing apart from 'this is heavy'."

"You used security to help steal stuff from the company?" I sigh.

"Oh yes, they were most helpful."

"Ah well, I suppose the company will learn something from this..." I say.

"Although not much," the PFY adds.

"No?" our ex-Boss asks.

"No, the current brainwave of the head of IT is to fit out our Madrid office with kit that we configure here - network, desktop and server - and just talk them through the install on the phone!" the PFY snaps.

"Really? Much kit?" our ex-Boss asks eagerly.

"A bit - but don't even think about it - it's being shipped privately. It SEEMS that the CEO's bought a villa in Spain and is going to get the company to pay for his shipping container by putting the computing gear in with his stuff."

"Sounds like someone needs to be taught a lesson..." our ex-tech says.

"You mean..." our ex-Boss asks.

"Uh-huh. We could rent a van full of empty computer boxes that need to be put into the container at the last minute."

"50/50 on the proceeds?" the PFY asks.

...Late the next night at the Cargo terminal...

"They must employ the same security staff as we do!" the PFY gasps. "I mean who's going to believe we're Rabies inspectors!"

"What was the container number?" the ex-Boss asks nervously, knowing we've got a fairly small window to do this in.

"Here," I said, handing over a shipping receipt.

"Okay... " he responds, driving slowly past rows of containers waiting to be loaded. "... BINGO - and it's at ground level!"

>Creak< >Clank< >Groaaaan<

"That's odd," the ex-Boss says. "There's computing boxes here but the furniture's complete crap."

"Well you guys go in and grab the stuff while the PFY and I grab the 'replacement' kit," I say.

"Okay... hang on, these are just empty b..." >GROAN SLAM!< >CLANK<

"Amazing what people will fall for," the PFY says, shaking his head and screwing up the shipping receipt.

"Still, a holiday in Spain can't be all bad," I say.

"True," the PFY says. "And I made sure to put the sacks of fertiliser next to the torch - so they know what to expect when we dob them in to the Coast Guard..."

"Okay then," I say. "We're about done. But before you return their van to the hire company..."

"Yes, I know," the PFY sighs. "Back into a solid object a couple of times, use up all the gas and wait outside a kebab place until someone's sick on the passenger seat."

As they say, vengeance is a pre-digested meal best served on pseudo leather...


Other stories you might like

  • AI tool finds hundreds of genes related to human motor neuron disease

    Breakthrough could lead to development of drugs to target illness

    A machine-learning algorithm has helped scientists find 690 human genes associated with a higher risk of developing motor neuron disease, according to research published in Cell this week.

    Neuronal cells in the central nervous system and brain break down and die in people with motor neuron disease, like amyotrophic lateral sclerosis (ALS) more commonly known as Lou Gehrig's disease, named after the baseball player who developed it. They lose control over their bodies, and as the disease progresses patients become completely paralyzed. There is currently no verified cure for ALS.

    Motor neuron disease typically affects people in old age and its causes are unknown. Johnathan Cooper-Knock, a clinical lecturer at the University of Sheffield in England and leader of Project MinE, an ambitious effort to perform whole genome sequencing of ALS, believes that understanding how genes affect cellular function could help scientists develop new drugs to treat the disease.

    Continue reading
  • Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores

    Exploit, vulnerability discussion online can offer useful signals

    Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

    Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known.

    CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least severe) to 10 (most severe). It's overseen by First.org, a US-based, non-profit computer security organization.

    Continue reading
  • Sniff those Ukrainian emails a little more carefully, advises Uncle Sam in wake of Belarusian digital vandalism

    NotPetya started over there, don't forget

    US companies should be on the lookout for security nasties from Ukrainian partners following the digital graffiti and malware attack launched against Ukraine by Belarus, the CISA has warned.

    In a statement issued on Tuesday, the Cybersecurity and Infrastructure Security Agency said it "strongly urges leaders and network defenders to be on alert for malicious cyber activity," having issued a checklist [PDF] of recommended actions to take.

    "If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic," added CISA, which also advised reviewing backups and disaster recovery drills.

    Continue reading

Biting the hand that feeds IT © 1998–2022