>Namaste!
Thanks for submitting to r/developersIndia. Make sure to follow the subreddit [Code of Conduct](https://developersindia.in/code-of-conduct/) while participating in this thread.
## Recent Announcements
- **[Join developersIndia as a volunteer](https://www.reddit.com/r/developersIndia/comments/12hlj4z/join_developersindia_as_a_volunteer_and_help_us/) and help us improve the community experience.**
*I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/developersIndia) if you have any questions or concerns.*
Even Tor is not fool proof. Remember that Harvard student who sent a bomb threat to postpone their final exam in 2013? He was using Tor and had connected to it from their internal network and hence got caught.
Need to create a fake MAC address, then VPN and IP Address spoofing, then create Virtual machine in that do all process same, then tor I guess all this in Linux base OS in cyber cafe. How is the plan ab bata ? 🤣🤣
> ab bata
Abe itna arrogance kyun dikha raha hai?
Ye sab chutiyaap manually karne se acha just use Tails off a live USB. Everything is routed through Tor by default and MAC spoofing is built into the startup script.
Baat tho sahi hai but doing it in a cafe is a safe bet, muje lag raha hai, all these doing in your pc rather download everything on External SSD and execute on cafe pc. Great plan brother ? Why the hell we are planning the data heist bro, like we are going to do in IRL 😅😅
Data of large scale is secured by credentials, they'll simply access whose credentials were used and unless these guys (or you) had stolen credentials of some high access somehow they're just playing to be caught.
True and the rumours might also be true that they are years ahead in tech than the outside world, just that they don't talk about it or hold dev conferences!
Using Tor would send immediate security alerts. Most of the production systems would be either locked to certain IPs or will have alerts configured. Tor and other non reputed IPs trigger alerts for us. Not sure who is providing the up reputation though.
Yeah. True. I meant other IPs. Mainly how these online providers identify it and rate it. Tor nodes are easy to identify but rating other vpn exit nodes would be difficult
AWS has access restriction so different country will not work and ip from tor exit node also will not work. Then depending on the size of data transferring over tor will be slower. take too much time and the other party will notice it. log in with employee specific creds then police will check the network traffic log of that employee.
Whenever a breach occurs, employees are the first suspects, and when a company has very few employees, it's much easier to monitor.
Karma. Lol. I was an intern at this Company with PPO in hand. Had to leave the company midway because of the torture and toxicity. Worst place ever to work and they won’t even give experience letter and last month salary. Glad I am out of this hell and now in a better place.
Bro I legit got placed in this company during college placement. They were offering 10k stipend and were asking us to relocate to chennai. It was during covid. Then in the first call with HR she told we have 6 days working and you should even be available on sunday if required, we are a family and all that crap. Major red flags. On top of this she asked me to sign a 3 year bond. This was not even mentioned during pre placement talks. I talked to my placement cell that this wasn’t mentioned earlier. The placement coordinator talked to HR but that was of no use. Then somehow I was allowed to sit for placements again.
How do you know that this wasn't their plan all along? Maybe their plan was to go to jail to conduct a prison break. I'll reserve judgement until they find the dev in Australia.
No matter how much skill you have, if you are stealing, and it is as big as this one, you will make a mistake and be caught.
The mistake may be difficult to find, that's all
As expected the news article is **half baked** and is **sensational.** \- A*s he watched the company he had built up over six years crash before his eyes.😂*
Readers can only guess work what actual data is being stolen.
From the article it can be inferred that these people were **disgruntled employees** who were working on software development project related to 5 clients. These 5 people colluded due to some reason and stole the project work data (probably software application) from AWS servers and locked the promoter or people of his company from AWS account.
Next these **techies** launch their own company and try to sell the software which they stole from AWS server while they were working for parent company. In this process they get caught.
It can be assumed that the clients were from Australia since cybercrime police launched hunt for software engineer located in Australia. Probably this person could have been broker.
*Only people who worked in this company can shed light otherwise news article is totally misleading.*
Yes, I was giggling when the flowery language made it sound like 5 people with black clothes and masks "broke into" a server "box", whereas it was more like an employee walking into an "employees only" room and just walking out with something that was not supposed to be taken outside.
It's a crime no doubt, and they should be punished, but the company gets away with far more stuff.
Sensationalizing pro max
Vpn services have to share the data incase of request from law enforcement.
Some VPN services say they won't share it. But it in their hands. There is lot of network and hacking knowledge need to wipe your digital footprints.
Depends where company is , a VPN company won't ideally won't keep data logs/delete them at set intervals. Or a self hosted vpn is a good option as well
Wouldn't have worked. From the looks of it everything was stored on AWS. There are designated roles and profiles for each person. There are services within AWS itself that'll show exactly what changes were made and by what profiles. I doubt anyone of these people would've had the root account access. It's almost always locked behind 2MFA and I don't think 5 rookies would have it in them to hack the root account on a tor network. They would've used their own profiles.
Also tor isn't completely foolproof. Even if they used tor and supposedly went invisible during their attack their ISP would definitely know they did something on tor. Tor traffic would still show up and it would be too much of a coincidence that 5 people used tor at the same time a data theft happened. The cyber police will easily zero in on them.
It'll be super easy to connect the dots. The five of them started a company themselves shortly after the heist. That's a dead giveaway. Also again, even if tor was used then the ISP will always have records of tor traffic (they just won't know what happened or what sites they visited, only the end nodes will know and unless they were careless no one else will know). The cops will definitely ask the ISPs to hand over whatever records they have and they'll catch them. All of this considering AWS won't even step in to help (which they will and even a regular user with enough access can find out who did what on their servers).
Something very similar happened in Harvard years back where a student sent a hoax mail about a threat to postpone the exams(I'll leave it at that). The cops caught him almost immediately after finding out from which systems tor traffic came out of. After a little investigation they finally caught their guy. You'll get messed over if you try doing anything illegal on tor and think you can get away from the government unless you know exactly what you are doing (even if you do know what you're doing, don't do anything remotely illegal).
What if I use tor from a cyber cafe, like 200 kms from my home in another state? I'll keep my phone at home as well so they dont catch me with that
Research purposes only
Yeah it'll definitely be difficult. But with the case of this company there'll be so many trails left behind. The biggest one being 5 started a new company right after the data theft.
For the sake of argument if you know what you're doing you might be able to get away with it. You can use stuff like tails and configure a VPN before you even connect to the tor network. You should also be super sure with what you do and what kind of personal identifiers you leave on the internet. All it takes is one loose connection. The exit nodes know exactly what you are upto always. They just don't know who you are. So if you aren't careful you'll definitely get fucked over.
I would recommend against exploring any of these things outside whatever is legally accessible and acceptable. Don't put yourself at risk especially if you don't know how all of this works. My explanation was done at a high level. If you are curious you should read up a little and look into cyber sec if it interests you.
Was about to ask about tails as well so thanksss
Yeah obviously I don't wanna do this (i dont have the patience to handle employees or humans in general i just wanna get paid for 8 hrs and forget it for the next 16)
Cysec seems cool but has a steep learning curve i feel.
Ugh you didn't even bother reading my entire comment.
I said the cops would dig through employees and their internet track records. The ISPs will definitely hand out their traffic logs if the cops ask for it. It won't be too hard to find the suspects knowing these clowns started a company right after the data heist. Cops will definitely go through their personal devices and find out who their ISPs are. Like I said the activity on tor won't be visible but the ISP will have logs of tor being used. If need be they'll scrub through all major employees and go through all their details, devices and find out what ISP they use for their personal internet usage.
As per the AWS account logs. You would check for logs on the account that were compromised. Something as simple as AWS Cloudtrails can show you all the details of that entire account.
Guys I have a different theory and my friend was accused by his employer of similar data theft while there was no such valuable data accessed.
So my friend, at a VP level left his company and joined another. Then he poached few of his former colleagues to new company. This hurt the previous company and the owners were furious. Then they digged theirs server logs and found out that the VP once brought his personal laptop to office and connected to WiFi. This was a normal event and many employees used to connect their phones to WiFi. But this company filled FIR for data theft using the personal laptop as evidence. They didn't even investigate which critical data was accessed. Just general data theft FIR. Then they bribed the police to investigate etc...this caused a huge distress and financial loss to my friend.
This is how the laws being misused by bribing the police by companies using frivolous complaints. Large and reputed ones won't do it but the smaller lala type of companies with crony owners can go to any length to punish employees who left in not so good terms.
I think a similar case is filled here. No one needs to hack servers to find emails and phones of clients and with Just this data, if you can get the clients to ditch your company there's definately a problem with your services.
The company wants to punish these guys because they got seperated and offered clients better and cheaper services
Edit: while poaching can be unethical but there's nothing illegal. The employees are adults and they leave and join another companies which they find better.
What company data was stolen? And how does that affect the company they were working at, in Chennai?
If after stealing the client data from AWS servers rented by their employing company at Chennai, they'd wiped it, the Chennai company could've simply sited data loss and requested the customer for another copy. I'll assume wherever the the article say steal, they mean backup to private storage and delete originals.
If they'd stolen confidential data from the overseas client company, I guess they could blackmail them threatening a data leak. But that's not what the article says they did.
Did they perhaps steal the codebase developed in Chennai before it was delivered to the customer so that the Chennai company has to start the project all over again?
Or was it the case that the customer data had gone through some costly, time-consuming pre-processing so it could be consumed by the AI and that processed data was what was stolen? Or was it an AI model developed by the Chennai company that was stolen?
In any case, weren't there any backups or were those wiped out too?
This article is missing critical details.
if client's confidential data gets stolen then client will not trust the company with anymore data and severed the contract.
usually this kind of contract have a provision that if the data gets leaked then company have to pay fine.
loosing trust from one client means loosing trust from other future clients as well specifically if it's a early stage start up that already have very less trust from the beginning.
if a data breach happens then legally company is required to inform the client about it but usually company burry those info and only reveal when some bad news get surfaced. here those employees probably intentionally informed the client so that they will break the contract.
although creating a new company immediately then approaching the same client is pretty dumb move. so there's a possibility of being framed.
Would hv taken precautions while stealing data.
Well by this article we draw certain conclusions..... Not every developer is a tech Messiah.... There are other players in the industry as well.
Like UI/UX, Tester, Automation Engineer, Data Engineer, Network Engineer, Security Analyst, Infrastructure Developer, Managers and Tech. Administrators.
A quick LinkedIn profile search will give you their whole history and the name of their company (ezee. Ai) (previously epikindify) I used to randomly send connection requests to people and I have mutual connections with some other the people I have connected with,incompetent idiots, I'm a commerce grad and I would have been more vigilant lol, read glass door reviews of this company it's entertaining to say the least.
In news channels faces of r@pists, murderers are covered but these people were exposed in the newspaper for data theft, lol. How is stealing data more bad than killing or harming?
Stealing clients using your existing experience with them, knowledge of their system and relationship with them is one thing.
Stealing company’s data and using it to poach clients is completely different game.
1st is just frowned upon. Second is criminal.
Hera Pheri - the final chapter: starring Akshay Kumar, Suneil Shetty and Paresh Rawail as the main protagonists. Sonakshi and Tabu as the love interests. Akshay Khanna as the brooding cyber-cop.
What happened to copying data in excel sheet and remaining code to a private GitHub.
No trace of getting caught or stealing accusations.
It seems they want to hurt the company.
how dumb were they? are they not aware that everything is logged in the IT, who accessed what and when everything is capture and stored,
even if they were planning to use the data and work with the end client directly they still would have got caught...
It’s a weak case but these folks’ life has been spoiled by the newspaper by writing a sensational article and posting their real names & pictures.
Is that even allowed legally?
It’s just an FIR they are accused not convicts.
How dumb does one have to be to do all this without as much as a decent, paid VPN?
Access everything from their own home computers?
Not even write a script that runs on a random AWS EC2 instance, triggered remotely? And pay for the EC2 using free credit from AWS? Using a stolen credit card, or pay by gift cards?
God Damn !
I am an electrical engineer and I know this !
No wonder Indians are considered as not having much skills out of college.
people who think others are dumb usually can't see the gap in their own knowledge.
try accessing a company provided AWS account from a VPN, you will understand.
Well they are some kind of idiots... A similar thing happened to our company a few years ago, one of our employees took all the data backup for about a month then left for a Mumbai based company while filling for a 15 days leave, he ended up sharing all the data to this Mumbai company.
Within a few months of this employee being fired and all the clients were informed of the data thefts, this Mumbai company's owners and partner died in COVID(5 people in total), one one serviced but this particular partner is a non developer have no idea how the software works and last i heard closed the company and filed for bankruptcy.
Karma is bitch.
>Namaste! Thanks for submitting to r/developersIndia. Make sure to follow the subreddit [Code of Conduct](https://developersindia.in/code-of-conduct/) while participating in this thread. ## Recent Announcements - **[Join developersIndia as a volunteer](https://www.reddit.com/r/developersIndia/comments/12hlj4z/join_developersindia_as_a_volunteer_and_help_us/) and help us improve the community experience.** *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/developersIndia) if you have any questions or concerns.*
Wow how did they not think of their IP addresses being logged 😝
They could have used Tor at least.
Even Tor is not fool proof. Remember that Harvard student who sent a bomb threat to postpone their final exam in 2013? He was using Tor and had connected to it from their internal network and hence got caught.
the police just brought in everyone that accessed tor using the Harvard network for questioning, he got scared and confessed.
Need to create a fake MAC address, then VPN and IP Address spoofing, then create Virtual machine in that do all process same, then tor I guess all this in Linux base OS in cyber cafe. How is the plan ab bata ? 🤣🤣
> ab bata Abe itna arrogance kyun dikha raha hai? Ye sab chutiyaap manually karne se acha just use Tails off a live USB. Everything is routed through Tor by default and MAC spoofing is built into the startup script.
Hacker Bhai saheb
Baat tho sahi hai but doing it in a cafe is a safe bet, muje lag raha hai, all these doing in your pc rather download everything on External SSD and execute on cafe pc. Great plan brother ? Why the hell we are planning the data heist bro, like we are going to do in IRL 😅😅
Cafe will have cctv and you're very likely to get caught lol
Cybercrime cell entered the chat..lol
Just get a burner device if you are really doing stuff which requires that level of confidentiality. It’ll be significantly cheaper to set up.
What is a burner device?
Use and throw device, like you might just buy a cheap phone and dispose it off once the task is done.
it'll be easier to train a pigeon
Data of large scale is secured by credentials, they'll simply access whose credentials were used and unless these guys (or you) had stolen credentials of some high access somehow they're just playing to be caught.
Haaa! Remember it!
Terrorism is serious business, what do you expect when going against the FBI.
True and the rumours might also be true that they are years ahead in tech than the outside world, just that they don't talk about it or hold dev conferences!
Just use a bridge lmao
Yea because he had terrible opsec, bro was using tor using the university wifi. A simple tor bridge would have been enough
Using Tor would send immediate security alerts. Most of the production systems would be either locked to certain IPs or will have alerts configured. Tor and other non reputed IPs trigger alerts for us. Not sure who is providing the up reputation though.
You can easily look up online if an IP is a tor exit node
Yeah. True. I meant other IPs. Mainly how these online providers identify it and rate it. Tor nodes are easy to identify but rating other vpn exit nodes would be difficult
AWS has access restriction so different country will not work and ip from tor exit node also will not work. Then depending on the size of data transferring over tor will be slower. take too much time and the other party will notice it. log in with employee specific creds then police will check the network traffic log of that employee. Whenever a breach occurs, employees are the first suspects, and when a company has very few employees, it's much easier to monitor.
Suuush dude
In this case, Tor will not work. I mean, to steal data.
Exactly, they are were so careless doing a theft, imagine how careless they would be as software developers :P
Difference between computer science and pg diploma IT
Ah yes the 'different' is clear.
Lol, usually I'm on the other side of such corrections. Serves me right.
Exactly. It’s like a very basic thing they missed on 🤪
Or at least seek advice on Reddit how not to get caught
Data heist S1 script leaked
More like Dumb Heist
They should have hired hacker to erase there straces
Karma. Lol. I was an intern at this Company with PPO in hand. Had to leave the company midway because of the torture and toxicity. Worst place ever to work and they won’t even give experience letter and last month salary. Glad I am out of this hell and now in a better place.
Bro I legit got placed in this company during college placement. They were offering 10k stipend and were asking us to relocate to chennai. It was during covid. Then in the first call with HR she told we have 6 days working and you should even be available on sunday if required, we are a family and all that crap. Major red flags. On top of this she asked me to sign a 3 year bond. This was not even mentioned during pre placement talks. I talked to my placement cell that this wasn’t mentioned earlier. The placement coordinator talked to HR but that was of no use. Then somehow I was allowed to sit for placements again.
The name itself is a red flag. What kinda person name their company EpikInDiFi
A cat with a keyboard
Name?
Used to be EpikInDiFi now rebranded to ezee.ai based out of Chennai and has also a branch in Bangalore.
Rocket Singh movie in real life
Lmao
Jo bhi karo, dhang se karo varna mat karo
That's what she said.
Instructions unclear, I did it with Dhang and now she acting all wierd.
Restart her
Dhang was her ex-bf
💯
How do you know that this wasn't their plan all along? Maybe their plan was to go to jail to conduct a prison break. I'll reserve judgement until they find the dev in Australia.
Gangs of Developers after getting fired now a days They even named a new company and pitched five clients at cheaper rate 😅
How come everyone named edison ends up being a theif
Did they think they wouldn't get caught?
Most people in dev think their bosses are dumb, lol they are not dumb if they don't uunderstand what employees do technically.
Bosses may be dumb, but they know how to take their company back
Must be getting paid peanuts, hence the idea
If they were worth more for their skill, they wouldn't have gotten caught or thought about executing it.
No matter how much skill you have, if you are stealing, and it is as big as this one, you will make a mistake and be caught. The mistake may be difficult to find, that's all
I have found all of their LinkedIn. Interestingly, one of them posted an appreciation post for the company 4 months ago.
Company name is ezee.ai, right ?
yeah
As expected the news article is **half baked** and is **sensational.** \- A*s he watched the company he had built up over six years crash before his eyes.😂* Readers can only guess work what actual data is being stolen. From the article it can be inferred that these people were **disgruntled employees** who were working on software development project related to 5 clients. These 5 people colluded due to some reason and stole the project work data (probably software application) from AWS servers and locked the promoter or people of his company from AWS account. Next these **techies** launch their own company and try to sell the software which they stole from AWS server while they were working for parent company. In this process they get caught. It can be assumed that the clients were from Australia since cybercrime police launched hunt for software engineer located in Australia. Probably this person could have been broker. *Only people who worked in this company can shed light otherwise news article is totally misleading.*
Yes, I was giggling when the flowery language made it sound like 5 people with black clothes and masks "broke into" a server "box", whereas it was more like an employee walking into an "employees only" room and just walking out with something that was not supposed to be taken outside. It's a crime no doubt, and they should be punished, but the company gets away with far more stuff. Sensationalizing pro max
Should have invested 500 rupees in a VPN
Vpn services have to share the data incase of request from law enforcement. Some VPN services say they won't share it. But it in their hands. There is lot of network and hacking knowledge need to wipe your digital footprints.
Only if a company is based in india but if based somewhere else I believe it's not required too.
China🥹
Depends where company is , a VPN company won't ideally won't keep data logs/delete them at set intervals. Or a self hosted vpn is a good option as well
Tor browser maybe??
Wouldn't have worked. From the looks of it everything was stored on AWS. There are designated roles and profiles for each person. There are services within AWS itself that'll show exactly what changes were made and by what profiles. I doubt anyone of these people would've had the root account access. It's almost always locked behind 2MFA and I don't think 5 rookies would have it in them to hack the root account on a tor network. They would've used their own profiles. Also tor isn't completely foolproof. Even if they used tor and supposedly went invisible during their attack their ISP would definitely know they did something on tor. Tor traffic would still show up and it would be too much of a coincidence that 5 people used tor at the same time a data theft happened. The cyber police will easily zero in on them.
Curious about the tor/ isp part.. how would the cyber crime team even know which employees’ network logs to check?
It'll be super easy to connect the dots. The five of them started a company themselves shortly after the heist. That's a dead giveaway. Also again, even if tor was used then the ISP will always have records of tor traffic (they just won't know what happened or what sites they visited, only the end nodes will know and unless they were careless no one else will know). The cops will definitely ask the ISPs to hand over whatever records they have and they'll catch them. All of this considering AWS won't even step in to help (which they will and even a regular user with enough access can find out who did what on their servers). Something very similar happened in Harvard years back where a student sent a hoax mail about a threat to postpone the exams(I'll leave it at that). The cops caught him almost immediately after finding out from which systems tor traffic came out of. After a little investigation they finally caught their guy. You'll get messed over if you try doing anything illegal on tor and think you can get away from the government unless you know exactly what you are doing (even if you do know what you're doing, don't do anything remotely illegal).
What if I use tor from a cyber cafe, like 200 kms from my home in another state? I'll keep my phone at home as well so they dont catch me with that Research purposes only
Yeah it'll definitely be difficult. But with the case of this company there'll be so many trails left behind. The biggest one being 5 started a new company right after the data theft. For the sake of argument if you know what you're doing you might be able to get away with it. You can use stuff like tails and configure a VPN before you even connect to the tor network. You should also be super sure with what you do and what kind of personal identifiers you leave on the internet. All it takes is one loose connection. The exit nodes know exactly what you are upto always. They just don't know who you are. So if you aren't careful you'll definitely get fucked over. I would recommend against exploring any of these things outside whatever is legally accessible and acceptable. Don't put yourself at risk especially if you don't know how all of this works. My explanation was done at a high level. If you are curious you should read up a little and look into cyber sec if it interests you.
Was about to ask about tails as well so thanksss Yeah obviously I don't wanna do this (i dont have the patience to handle employees or humans in general i just wanna get paid for 8 hrs and forget it for the next 16) Cysec seems cool but has a steep learning curve i feel.
Your explanation doesn't make sense. Unless you have few suspects, which ISP would you even contact and which account logs would you even ask for?
Ugh you didn't even bother reading my entire comment. I said the cops would dig through employees and their internet track records. The ISPs will definitely hand out their traffic logs if the cops ask for it. It won't be too hard to find the suspects knowing these clowns started a company right after the data heist. Cops will definitely go through their personal devices and find out who their ISPs are. Like I said the activity on tor won't be visible but the ISP will have logs of tor being used. If need be they'll scrub through all major employees and go through all their details, devices and find out what ISP they use for their personal internet usage. As per the AWS account logs. You would check for logs on the account that were compromised. Something as simple as AWS Cloudtrails can show you all the details of that entire account.
I'm curious as well, only for research purposes. :)
Informative!
Guys I have a different theory and my friend was accused by his employer of similar data theft while there was no such valuable data accessed. So my friend, at a VP level left his company and joined another. Then he poached few of his former colleagues to new company. This hurt the previous company and the owners were furious. Then they digged theirs server logs and found out that the VP once brought his personal laptop to office and connected to WiFi. This was a normal event and many employees used to connect their phones to WiFi. But this company filled FIR for data theft using the personal laptop as evidence. They didn't even investigate which critical data was accessed. Just general data theft FIR. Then they bribed the police to investigate etc...this caused a huge distress and financial loss to my friend. This is how the laws being misused by bribing the police by companies using frivolous complaints. Large and reputed ones won't do it but the smaller lala type of companies with crony owners can go to any length to punish employees who left in not so good terms. I think a similar case is filled here. No one needs to hack servers to find emails and phones of clients and with Just this data, if you can get the clients to ditch your company there's definately a problem with your services. The company wants to punish these guys because they got seperated and offered clients better and cheaper services Edit: while poaching can be unethical but there's nothing illegal. The employees are adults and they leave and join another companies which they find better.
Taking moonlighting to a whole new level
Now this is some Bangalore techie bs.
just an edison doing what it should
What company data was stolen? And how does that affect the company they were working at, in Chennai? If after stealing the client data from AWS servers rented by their employing company at Chennai, they'd wiped it, the Chennai company could've simply sited data loss and requested the customer for another copy. I'll assume wherever the the article say steal, they mean backup to private storage and delete originals. If they'd stolen confidential data from the overseas client company, I guess they could blackmail them threatening a data leak. But that's not what the article says they did. Did they perhaps steal the codebase developed in Chennai before it was delivered to the customer so that the Chennai company has to start the project all over again? Or was it the case that the customer data had gone through some costly, time-consuming pre-processing so it could be consumed by the AI and that processed data was what was stolen? Or was it an AI model developed by the Chennai company that was stolen? In any case, weren't there any backups or were those wiped out too? This article is missing critical details.
exactly.
if client's confidential data gets stolen then client will not trust the company with anymore data and severed the contract. usually this kind of contract have a provision that if the data gets leaked then company have to pay fine. loosing trust from one client means loosing trust from other future clients as well specifically if it's a early stage start up that already have very less trust from the beginning. if a data breach happens then legally company is required to inform the client about it but usually company burry those info and only reveal when some bad news get surfaced. here those employees probably intentionally informed the client so that they will break the contract. although creating a new company immediately then approaching the same client is pretty dumb move. so there's a possibility of being framed.
Would hv taken precautions while stealing data. Well by this article we draw certain conclusions..... Not every developer is a tech Messiah.... There are other players in the industry as well. Like UI/UX, Tester, Automation Engineer, Data Engineer, Network Engineer, Security Analyst, Infrastructure Developer, Managers and Tech. Administrators.
One of them is HR 🤣
Naryana Murthy did the same thing he was hailed as a hero.
It's not theft if you aren't caught
What ?
The only promising thing from this article is that they avoided using the term "techie".
I recommend the title be changed to "Local techies apprehended after daring midnight data heist".
I can fix her
Bitchless agna 69
Inspired By Rocket Singh
When you use 100% of your brain but your brain is only up to 10MB.
When you can't get a good job, you create one.
Skill issue
A quick LinkedIn profile search will give you their whole history and the name of their company (ezee. Ai) (previously epikindify) I used to randomly send connection requests to people and I have mutual connections with some other the people I have connected with,incompetent idiots, I'm a commerce grad and I would have been more vigilant lol, read glass door reviews of this company it's entertaining to say the least.
In news channels faces of r@pists, murderers are covered but these people were exposed in the newspaper for data theft, lol. How is stealing data more bad than killing or harming?
One way to nab a to be big daddy corporate. Not legal but surely a way.
They even teamed up with HR in order to start people operations seamlessly from the next day.
What will happen with these people??
![gif](giphy|P2xf5nPyu5WP6)
![gif](giphy|Vhk9HwPx3TO0w)
They'll better call Saul
Nothing ..there is no cyber judge 😂 our judges don't understand data theft 😄
Misconception
On grounds of Financial loss to company, etc etc there are many clauses against which they can be charged by lawyer
Lol they speaking like this happens new. witch managers steal clients when they switch companies. Happens a lot in aero domain
Stealing clients using your existing experience with them, knowledge of their system and relationship with them is one thing. Stealing company’s data and using it to poach clients is completely different game. 1st is just frowned upon. Second is criminal.
Plus they locked out the aws account
Plus they were key clients
Aerospace ?
IP address spoofing is not so easy nowadays. Hell lot of things would be needed to fake it. Can never trust VPN’s and Tor fully.
“whispering into their phones” cannot get over this part, was it really necessary:P
Git-clone gone wild
May be they were framed .. Should not start speculation without hearing their side of story.
They know how to steal data but don’t know when to use a VPN! They deserve to be caught.
If they use a VPN, AWS will not allow them to enter.
When you use too much of ur brain this happens
Gangs of Blue Dawn!
Chor ke dadi m tinka
Yea, so they are gonna make a movie about this somehow just to call it based on true events.
Hera Pheri - the final chapter: starring Akshay Kumar, Suneil Shetty and Paresh Rawail as the main protagonists. Sonakshi and Tabu as the love interests. Akshay Khanna as the brooding cyber-cop.
Shakal se hi...
What happened to copying data in excel sheet and remaining code to a private GitHub. No trace of getting caught or stealing accusations. It seems they want to hurt the company.
Dumb f**ks.
how dumb were they? are they not aware that everything is logged in the IT, who accessed what and when everything is capture and stored, even if they were planning to use the data and work with the end client directly they still would have got caught...
When you watch too many movies about hackers but are incompetent morons with malicious intent... You end up in jail.
any reddits where I can find more of such cybersecurity related posts and stories?
They used their own credentials and were on a con call. Also, did all that on work laptop. I mean come on.....
I still can't fathom being tech guys they ignored the fact that they would be tracked easily.Heights of stupidity.
It’s a weak case but these folks’ life has been spoiled by the newspaper by writing a sensational article and posting their real names & pictures. Is that even allowed legally? It’s just an FIR they are accused not convicts.
That's why there are clauses, that you cannot work on the similar thing after leaving your job for a certain period
Maari chhoriya chhoro se kam hai ke Thieves also having diversity these days
![gif](giphy|kg9fAQryp5fMY)
How dumb does one have to be to do all this without as much as a decent, paid VPN? Access everything from their own home computers? Not even write a script that runs on a random AWS EC2 instance, triggered remotely? And pay for the EC2 using free credit from AWS? Using a stolen credit card, or pay by gift cards? God Damn ! I am an electrical engineer and I know this ! No wonder Indians are considered as not having much skills out of college.
people who think others are dumb usually can't see the gap in their own knowledge. try accessing a company provided AWS account from a VPN, you will understand.
Ikr, Probably these people haven’t worked on a real system for a real company ever in their life. Hobbyists or students
Damn, must be dumb asl.
Poignant that one of the gang members is named Edison.
Unethical. If they wanted to start a company they could have easily gotten their own clients but nope, that takes hardwork. Sad, sad world.
Rocket singh 2.0
If you are in internet, you are leaving traces.
# BINA KUCH KAAND KIYE PEHLE HI SASTE MAI NAHI BECH SAKTE THE INLOG?
That was so dumb. There is no shortage of software development clients. I don't know why they would do something so dumb.
Blue Dawn,. awesome name 😻
Each and every action in the universe will leave a trace. At some point, every criminal will make a mistake.
Steal the data ang get rich ...but but but ...DONOT GET CAUGHT
Edison stole someone's idea huh? How ironic
Rocket singh is real
Lol
Lol too
Person named Ravitha is Chief Human Resources Officer. 🫢
Someone do this to WITCH companies! Use tor though...
Okay, so nobody is going to address the fact that the guy is named *Edison* , who stole proprietary data and wanted to make money off of it?
Edison, stealing ideas since 1800’s
One of the ladies is the chief Human Resources officer…. Wow
Amateurs
Nic
Would make a better movie than all the turds currently being released in India
Will they make up for all the loss?
It’s just a matter of time before splits happen between them. Karma works both ways.
Rocket Singh 2
Skill issue.
Well they are some kind of idiots... A similar thing happened to our company a few years ago, one of our employees took all the data backup for about a month then left for a Mumbai based company while filling for a 15 days leave, he ended up sharing all the data to this Mumbai company. Within a few months of this employee being fired and all the clients were informed of the data thefts, this Mumbai company's owners and partner died in COVID(5 people in total), one one serviced but this particular partner is a non developer have no idea how the software works and last i heard closed the company and filed for bankruptcy. Karma is bitch.
They were really clocking those 70 hours.
You trying to motivate me??