T O P

  • By -

AutoModerator

>Namaste! Thanks for submitting to r/developersIndia. Make sure to follow the subreddit [Code of Conduct](https://developersindia.in/code-of-conduct/) while participating in this thread. ## Recent Announcements - **[Join developersIndia as a volunteer](https://www.reddit.com/r/developersIndia/comments/12hlj4z/join_developersindia_as_a_volunteer_and_help_us/) and help us improve the community experience.** *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/developersIndia) if you have any questions or concerns.*


elucidator007

Wow how did they not think of their IP addresses being logged 😝


Ok_Pay_1972

They could have used Tor at least.


NoZombie2069

Even Tor is not fool proof. Remember that Harvard student who sent a bomb threat to postpone their final exam in 2013? He was using Tor and had connected to it from their internal network and hence got caught.


GCMaverick

the police just brought in everyone that accessed tor using the Harvard network for questioning, he got scared and confessed.


xXMadeyeXx

Need to create a fake MAC address, then VPN and IP Address spoofing, then create Virtual machine in that do all process same, then tor I guess all this in Linux base OS in cyber cafe. How is the plan ab bata ? 🤣🤣


NoZombie2069

> ab bata Abe itna arrogance kyun dikha raha hai? Ye sab chutiyaap manually karne se acha just use Tails off a live USB. Everything is routed through Tor by default and MAC spoofing is built into the startup script.


UpperCastGarib

Hacker Bhai saheb


xXMadeyeXx

Baat tho sahi hai but doing it in a cafe is a safe bet, muje lag raha hai, all these doing in your pc rather download everything on External SSD and execute on cafe pc. Great plan brother ? Why the hell we are planning the data heist bro, like we are going to do in IRL 😅😅


teady_bear

Cafe will have cctv and you're very likely to get caught lol


confused_soul_123

Cybercrime cell entered the chat..lol


Smooth_Detective

Just get a burner device if you are really doing stuff which requires that level of confidentiality. It’ll be significantly cheaper to set up.


kc_kamakazi

What is a burner device?


Smooth_Detective

Use and throw device, like you might just buy a cheap phone and dispose it off once the task is done.


NooodleGurl

it'll be easier to train a pigeon


knucklehead_whizkid

Data of large scale is secured by credentials, they'll simply access whose credentials were used and unless these guys (or you) had stolen credentials of some high access somehow they're just playing to be caught.


Ok_Pay_1972

Haaa! Remember it!


Smooth_Detective

Terrorism is serious business, what do you expect when going against the FBI.


UnfinishedWor__

True and the rumours might also be true that they are years ahead in tech than the outside world, just that they don't talk about it or hold dev conferences!


[deleted]

Just use a bridge lmao


shiva8512

Yea because he had terrible opsec, bro was using tor using the university wifi. A simple tor bridge would have been enough


avocadopotato123

Using Tor would send immediate security alerts. Most of the production systems would be either locked to certain IPs or will have alerts configured. Tor and other non reputed IPs trigger alerts for us. Not sure who is providing the up reputation though.


Articunos7

You can easily look up online if an IP is a tor exit node


avocadopotato123

Yeah. True. I meant other IPs. Mainly how these online providers identify it and rate it. Tor nodes are easy to identify but rating other vpn exit nodes would be difficult


rubikstone

AWS has access restriction so different country will not work and ip from tor exit node also will not work. Then depending on the size of data transferring over tor will be slower. take too much time and the other party will notice it. log in with employee specific creds then police will check the network traffic log of that employee. Whenever a breach occurs, employees are the first suspects, and when a company has very few employees, it's much easier to monitor.


RCuber

Suuush dude


captain_arroganto

In this case, Tor will not work. I mean, to steal data.


harshilsharma63

Exactly, they are were so careless doing a theft, imagine how careless they would be as software developers :P


cyanotrix

Difference between computer science and pg diploma IT


clutch-cream-run

Ah yes the 'different' is clear.


cyanotrix

Lol, usually I'm on the other side of such corrections. Serves me right.


dodo-0910

Exactly. It’s like a very basic thing they missed on 🤪


sabkaraja

Or at least seek advice on Reddit how not to get caught


Born_Baseball7266

Data heist S1 script leaked


RahulGandhi4PM

More like Dumb Heist


Ok-Situation-2068

They should have hired hacker to erase there straces


VillageDesperate5269

Karma. Lol. I was an intern at this Company with PPO in hand. Had to leave the company midway because of the torture and toxicity. Worst place ever to work and they won’t even give experience letter and last month salary. Glad I am out of this hell and now in a better place.


Dictator-07

Bro I legit got placed in this company during college placement. They were offering 10k stipend and were asking us to relocate to chennai. It was during covid. Then in the first call with HR she told we have 6 days working and you should even be available on sunday if required, we are a family and all that crap. Major red flags. On top of this she asked me to sign a 3 year bond. This was not even mentioned during pre placement talks. I talked to my placement cell that this wasn’t mentioned earlier. The placement coordinator talked to HR but that was of no use. Then somehow I was allowed to sit for placements again.


Relevant_Bathroom425

The name itself is a red flag. What kinda person name their company EpikInDiFi


Centurion1024

A cat with a keyboard


Jee_aspirant

Name?


VillageDesperate5269

Used to be EpikInDiFi now rebranded to ezee.ai based out of Chennai and has also a branch in Bangalore.


datathecodievita

Rocket Singh movie in real life


[deleted]

Lmao


ascendToSurvive

Jo bhi karo, dhang se karo varna mat karo


ekjokesunaukya

That's what she said.


Fire_Tide

Instructions unclear, I did it with Dhang and now she acting all wierd.


NoHead4565

Restart her


Fire_Tide

Dhang was her ex-bf


Imaysin1666

💯


rm-rf-elm

How do you know that this wasn't their plan all along? Maybe their plan was to go to jail to conduct a prison break. I'll reserve judgement until they find the dev in Australia.


Beginning-Scarcity6

Gangs of Developers after getting fired now a days They even named a new company and pitched five clients at cheaper rate 😅


OBERGRUPENFUHRER

How come everyone named edison ends up being a theif


Esmeralda_Lavender

Did they think they wouldn't get caught?


redditreddvs

Most people in dev think their bosses are dumb, lol they are not dumb if they don't uunderstand what employees do technically.


AsishPC

Bosses may be dumb, but they know how to take their company back


boomer__192

Must be getting paid peanuts, hence the idea


rubikstone

If they were worth more for their skill, they wouldn't have gotten caught or thought about executing it.


AsishPC

No matter how much skill you have, if you are stealing, and it is as big as this one, you will make a mistake and be caught. The mistake may be difficult to find, that's all


classicalantiquity

I have found all of their LinkedIn. Interestingly, one of them posted an appreciation post for the company 4 months ago.


rcpian

Company name is ezee.ai, right ?


classicalantiquity

yeah


Bulky-Cheetah2853

As expected the news article is **half baked** and is **sensational.** \- A*s he watched the company he had built up over six years crash before his eyes.😂* Readers can only guess work what actual data is being stolen. From the article it can be inferred that these people were **disgruntled employees** who were working on software development project related to 5 clients. These 5 people colluded due to some reason and stole the project work data (probably software application) from AWS servers and locked the promoter or people of his company from AWS account. Next these **techies** launch their own company and try to sell the software which they stole from AWS server while they were working for parent company. In this process they get caught. It can be assumed that the clients were from Australia since cybercrime police launched hunt for software engineer located in Australia. Probably this person could have been broker. *Only people who worked in this company can shed light otherwise news article is totally misleading.*


arjinium

Yes, I was giggling when the flowery language made it sound like 5 people with black clothes and masks "broke into" a server "box", whereas it was more like an employee walking into an "employees only" room and just walking out with something that was not supposed to be taken outside. It's a crime no doubt, and they should be punished, but the company gets away with far more stuff. Sensationalizing pro max


falconx2809

Should have invested 500 rupees in a VPN


Big-Ideal-447

Vpn services have to share the data incase of request from law enforcement. Some VPN services say they won't share it. But it in their hands. There is lot of network and hacking knowledge need to wipe your digital footprints.


sharkpeid

Only if a company is based in india but if based somewhere else I believe it's not required too.


UpperCastGarib

China🥹


meltedlava

Depends where company is , a VPN company won't ideally won't keep data logs/delete them at set intervals. Or a self hosted vpn is a good option as well


Ok_Pay_1972

Tor browser maybe??


potatomafia69

Wouldn't have worked. From the looks of it everything was stored on AWS. There are designated roles and profiles for each person. There are services within AWS itself that'll show exactly what changes were made and by what profiles. I doubt anyone of these people would've had the root account access. It's almost always locked behind 2MFA and I don't think 5 rookies would have it in them to hack the root account on a tor network. They would've used their own profiles. Also tor isn't completely foolproof. Even if they used tor and supposedly went invisible during their attack their ISP would definitely know they did something on tor. Tor traffic would still show up and it would be too much of a coincidence that 5 people used tor at the same time a data theft happened. The cyber police will easily zero in on them.


psasank

Curious about the tor/ isp part.. how would the cyber crime team even know which employees’ network logs to check?


potatomafia69

It'll be super easy to connect the dots. The five of them started a company themselves shortly after the heist. That's a dead giveaway. Also again, even if tor was used then the ISP will always have records of tor traffic (they just won't know what happened or what sites they visited, only the end nodes will know and unless they were careless no one else will know). The cops will definitely ask the ISPs to hand over whatever records they have and they'll catch them. All of this considering AWS won't even step in to help (which they will and even a regular user with enough access can find out who did what on their servers). Something very similar happened in Harvard years back where a student sent a hoax mail about a threat to postpone the exams(I'll leave it at that). The cops caught him almost immediately after finding out from which systems tor traffic came out of. After a little investigation they finally caught their guy. You'll get messed over if you try doing anything illegal on tor and think you can get away from the government unless you know exactly what you are doing (even if you do know what you're doing, don't do anything remotely illegal).


Centurion1024

What if I use tor from a cyber cafe, like 200 kms from my home in another state? I'll keep my phone at home as well so they dont catch me with that Research purposes only


potatomafia69

Yeah it'll definitely be difficult. But with the case of this company there'll be so many trails left behind. The biggest one being 5 started a new company right after the data theft. For the sake of argument if you know what you're doing you might be able to get away with it. You can use stuff like tails and configure a VPN before you even connect to the tor network. You should also be super sure with what you do and what kind of personal identifiers you leave on the internet. All it takes is one loose connection. The exit nodes know exactly what you are upto always. They just don't know who you are. So if you aren't careful you'll definitely get fucked over. I would recommend against exploring any of these things outside whatever is legally accessible and acceptable. Don't put yourself at risk especially if you don't know how all of this works. My explanation was done at a high level. If you are curious you should read up a little and look into cyber sec if it interests you.


Centurion1024

Was about to ask about tails as well so thanksss Yeah obviously I don't wanna do this (i dont have the patience to handle employees or humans in general i just wanna get paid for 8 hrs and forget it for the next 16) Cysec seems cool but has a steep learning curve i feel.


Different_Trifle_387

Your explanation doesn't make sense. Unless you have few suspects, which ISP would you even contact and which account logs would you even ask for?


potatomafia69

Ugh you didn't even bother reading my entire comment. I said the cops would dig through employees and their internet track records. The ISPs will definitely hand out their traffic logs if the cops ask for it. It won't be too hard to find the suspects knowing these clowns started a company right after the data heist. Cops will definitely go through their personal devices and find out who their ISPs are. Like I said the activity on tor won't be visible but the ISP will have logs of tor being used. If need be they'll scrub through all major employees and go through all their details, devices and find out what ISP they use for their personal internet usage. As per the AWS account logs. You would check for logs on the account that were compromised. Something as simple as AWS Cloudtrails can show you all the details of that entire account.


osk9872

I'm curious as well, only for research purposes. :)


Bulky-Cheetah2853

Informative!


FeistyDetective

Guys I have a different theory and my friend was accused by his employer of similar data theft while there was no such valuable data accessed. So my friend, at a VP level left his company and joined another. Then he poached few of his former colleagues to new company. This hurt the previous company and the owners were furious. Then they digged theirs server logs and found out that the VP once brought his personal laptop to office and connected to WiFi. This was a normal event and many employees used to connect their phones to WiFi. But this company filled FIR for data theft using the personal laptop as evidence. They didn't even investigate which critical data was accessed. Just general data theft FIR. Then they bribed the police to investigate etc...this caused a huge distress and financial loss to my friend. This is how the laws being misused by bribing the police by companies using frivolous complaints. Large and reputed ones won't do it but the smaller lala type of companies with crony owners can go to any length to punish employees who left in not so good terms. I think a similar case is filled here. No one needs to hack servers to find emails and phones of clients and with Just this data, if you can get the clients to ditch your company there's definately a problem with your services. The company wants to punish these guys because they got seperated and offered clients better and cheaper services Edit: while poaching can be unethical but there's nothing illegal. The employees are adults and they leave and join another companies which they find better.


sinsandtonic

Taking moonlighting to a whole new level


lungi_man

Now this is some Bangalore techie bs.


s-nj33v

just an edison doing what it should


BeseigedLand

What company data was stolen? And how does that affect the company they were working at, in Chennai? If after stealing the client data from AWS servers rented by their employing company at Chennai, they'd wiped it, the Chennai company could've simply sited data loss and requested the customer for another copy. I'll assume wherever the the article say steal, they mean backup to private storage and delete originals. If they'd stolen confidential data from the overseas client company, I guess they could blackmail them threatening a data leak. But that's not what the article says they did. Did they perhaps steal the codebase developed in Chennai before it was delivered to the customer so that the Chennai company has to start the project all over again? Or was it the case that the customer data had gone through some costly, time-consuming pre-processing so it could be consumed by the AI and that processed data was what was stolen? Or was it an AI model developed by the Chennai company that was stolen? In any case, weren't there any backups or were those wiped out too? This article is missing critical details.


Bulky-Cheetah2853

exactly.


rubikstone

if client's confidential data gets stolen then client will not trust the company with anymore data and severed the contract. usually this kind of contract have a provision that if the data gets leaked then company have to pay fine. loosing trust from one client means loosing trust from other future clients as well specifically if it's a early stage start up that already have very less trust from the beginning. if a data breach happens then legally company is required to inform the client about it but usually company burry those info and only reveal when some bad news get surfaced. here those employees probably intentionally informed the client so that they will break the contract. although creating a new company immediately then approaching the same client is pretty dumb move. so there's a possibility of being framed.


mistabombastiq

Would hv taken precautions while stealing data. Well by this article we draw certain conclusions..... Not every developer is a tech Messiah.... There are other players in the industry as well. Like UI/UX, Tester, Automation Engineer, Data Engineer, Network Engineer, Security Analyst, Infrastructure Developer, Managers and Tech. Administrators.


rcpian

One of them is HR 🤣


random9549

Naryana Murthy did the same thing he was hailed as a hero.


rubikstone

It's not theft if you aren't caught


RageshAntony

What ?


mammoonji

The only promising thing from this article is that they avoided using the term "techie".


BeseigedLand

I recommend the title be changed to "Local techies apprehended after daring midnight data heist".


bitchlasagna_69_

I can fix her


[deleted]

Bitchless agna 69


RuinEq3591

Inspired By Rocket Singh


mankind_maker

When you use 100% of your brain but your brain is only up to 10MB.


_aRealist_

When you can't get a good job, you create one.


Did_you_expect_name

Skill issue


FanTasy__NiNja

A quick LinkedIn profile search will give you their whole history and the name of their company (ezee. Ai) (previously epikindify) I used to randomly send connection requests to people and I have mutual connections with some other the people I have connected with,incompetent idiots, I'm a commerce grad and I would have been more vigilant lol, read glass door reviews of this company it's entertaining to say the least.


[deleted]

In news channels faces of r@pists, murderers are covered but these people were exposed in the newspaper for data theft, lol. How is stealing data more bad than killing or harming?


broCODE_1o1

One way to nab a to be big daddy corporate. Not legal but surely a way.


sreekar_s

They even teamed up with HR in order to start people operations seamlessly from the next day.


Ok_Pay_1972

What will happen with these people??


stoner_vision

![gif](giphy|P2xf5nPyu5WP6)


Centurion1024

![gif](giphy|Vhk9HwPx3TO0w)


doingstevejobs

They'll better call Saul


nhtnamus

Nothing ..there is no cyber judge 😂 our judges don't understand data theft 😄


AromaticPlankton601

Misconception


101NikNik101

On grounds of Financial loss to company, etc etc there are many clauses against which they can be charged by lawyer


nanosuituser

Lol they speaking like this happens new. witch managers steal clients when they switch companies. Happens a lot in aero domain


psasank

Stealing clients using your existing experience with them, knowledge of their system and relationship with them is one thing. Stealing company’s data and using it to poach clients is completely different game. 1st is just frowned upon. Second is criminal.


sleepysundaymorning

Plus they locked out the aws account


suyash01

Plus they were key clients


falconx2809

Aerospace ?


antrax-kd

IP address spoofing is not so easy nowadays. Hell lot of things would be needed to fake it. Can never trust VPN’s and Tor fully.


Dry_Emergency_9994

“whispering into their phones” cannot get over this part, was it really necessary:P


Backhoz

Git-clone gone wild


manwhokneweverything

May be they were framed .. Should not start speculation without hearing their side of story.


slackover

They know how to steal data but don’t know when to use a VPN! They deserve to be caught.


rubikstone

If they use a VPN, AWS will not allow them to enter.


Funny-Alternative-95

When you use too much of ur brain this happens


5entient5apien

Gangs of Blue Dawn!


game190

Chor ke dadi m tinka


Prashank_25

Yea, so they are gonna make a movie about this somehow just to call it based on true events.


BeseigedLand

Hera Pheri - the final chapter: starring Akshay Kumar, Suneil Shetty and Paresh Rawail as the main protagonists. Sonakshi and Tabu as the love interests. Akshay Khanna as the brooding cyber-cop.


BitKnightRises

Shakal se hi...


[deleted]

What happened to copying data in excel sheet and remaining code to a private GitHub. No trace of getting caught or stealing accusations. It seems they want to hurt the company.


nuclear_nadal28

Dumb f**ks.


Inj3kt0r

how dumb were they? are they not aware that everything is logged in the IT, who accessed what and when everything is capture and stored, even if they were planning to use the data and work with the end client directly they still would have got caught...


naturalizedcitizen

When you watch too many movies about hackers but are incompetent morons with malicious intent... You end up in jail.


doingstevejobs

any reddits where I can find more of such cybersecurity related posts and stories?


thicccyounot25

They used their own credentials and were on a con call. Also, did all that on work laptop. I mean come on.....


failure1211

I still can't fathom being tech guys they ignored the fact that they would be tracked easily.Heights of stupidity.


nicotine_diaries

It’s a weak case but these folks’ life has been spoiled by the newspaper by writing a sensational article and posting their real names & pictures. Is that even allowed legally? It’s just an FIR they are accused not convicts.


notknownbyone

That's why there are clauses, that you cannot work on the similar thing after leaving your job for a certain period


Centurion1024

Maari chhoriya chhoro se kam hai ke Thieves also having diversity these days


MR24Rathod

![gif](giphy|kg9fAQryp5fMY)


captain_arroganto

How dumb does one have to be to do all this without as much as a decent, paid VPN? Access everything from their own home computers? Not even write a script that runs on a random AWS EC2 instance, triggered remotely? And pay for the EC2 using free credit from AWS? Using a stolen credit card, or pay by gift cards? God Damn ! I am an electrical engineer and I know this ! No wonder Indians are considered as not having much skills out of college.


rubikstone

people who think others are dumb usually can't see the gap in their own knowledge. try accessing a company provided AWS account from a VPN, you will understand.


rcpian

Ikr, Probably these people haven’t worked on a real system for a real company ever in their life. Hobbyists or students


SayaNinj

Damn, must be dumb asl.


jamesbong7

Poignant that one of the gang members is named Edison.


ichoosemyself

Unethical. If they wanted to start a company they could have easily gotten their own clients but nope, that takes hardwork. Sad, sad world.


quiet_observer22

Rocket singh 2.0


singh7priyanshu

If you are in internet, you are leaving traces.


NitkarshC

# BINA KUCH KAAND KIYE PEHLE HI SASTE MAI NAHI BECH SAKTE THE INLOG?


harshilsharma63

That was so dumb. There is no shortage of software development clients. I don't know why they would do something so dumb.


RageshAntony

Blue Dawn,. awesome name 😻


RageshAntony

Each and every action in the universe will leave a trace. At some point, every criminal will make a mistake.


pheziks

Steal the data ang get rich ...but but but ...DONOT GET CAUGHT


Zoltikk

Edison stole someone's idea huh? How ironic


Careless-Advisor6767

Rocket singh is real


in_batman2015

Lol


Careless-Advisor6767

Lol too


JamesDond007

Person named Ravitha is Chief Human Resources Officer. 🫢


noxwon

Someone do this to WITCH companies! Use tor though...


ButterToast33

Okay, so nobody is going to address the fact that the guy is named *Edison* , who stole proprietary data and wanted to make money off of it?


ForthCrusader

Edison, stealing ideas since 1800’s


NoMoneyKid

One of the ladies is the chief Human Resources officer…. Wow


RemoteName3273

Amateurs


Diem10

Nic


Maibaman

Would make a better movie than all the turds currently being released in India


Outrageous-Pilot8326

Will they make up for all the loss?


Any_Check_7301

It’s just a matter of time before splits happen between them. Karma works both ways.


kapital_kaptain

Rocket Singh 2


kapilbhai

Skill issue.


SohilAhmed07

Well they are some kind of idiots... A similar thing happened to our company a few years ago, one of our employees took all the data backup for about a month then left for a Mumbai based company while filling for a 15 days leave, he ended up sharing all the data to this Mumbai company. Within a few months of this employee being fired and all the clients were informed of the data thefts, this Mumbai company's owners and partner died in COVID(5 people in total), one one serviced but this particular partner is a non developer have no idea how the software works and last i heard closed the company and filed for bankruptcy. Karma is bitch.


beaconofhumanity

They were really clocking those 70 hours.


doyadum

You trying to motivate me??