62%
Financial Gain
PRIMARY DRIVER
Selling proprietary data, customer records, or source code to competitors. Corporate espionage contracts, dark web data sales, or theft of funds via fraudulent transactions. Often triggered by personal financial distress or greed.
21%
Grievance & Revenge
DISGRUNTLEMENT
Retaliation for perceived unfair treatment: denied promotion, disciplinary action, or termination. Sabotage of systems, deletion of critical data, or exposure of confidential information as revenge. Often escalates rapidly after a triggering event.
12%
Ideology / Espionage
STATE-SPONSORED
Nation-state recruited or ideologically motivated insiders passing classified information to foreign intelligence services. Defense, government, and technology sector employees are primary targets for recruitment by hostile state actors.
5%
Coercion / Compromise
INVOLUNTARY ACTOR
Employee is blackmailed, extorted, or threatened into providing access or stealing data. May have been compromised externally first (gambling debts, personal secrets) and subsequently weaponized by criminal or state actors.
PROFILE - MIT-001 // ACTIVE
👨💼
The Departing Employee
IT SYSTEM ADMIN - 7 YRS TENURE
Accepted competitor job offer 3 weeks prior
Bulk download of proprietary codebase to personal USB
Accessed systems not required for current role
Disabled audit logging on his own workstation
Transferred 40GB to personal Google Drive last week
RISK: IP THEFT - COMPETITOR TRANSFER
PROFILE - MIT-002 // ACTIVE
👩💻
The Disgruntled DBA
DATABASE ADMINISTRATOR - FINANCE
Recently passed over for promotion - filed HR complaint
Accessing customer PII tables outside business hours
Ran SELECT * queries on 2.4M customer records
Created undocumented database user accounts
Searched internally for "how to cover tracks database"
RISK: DATA EXFIL - SABOTAGE
PROFILE - MIT-003 // ACTIVE
🕵️
The Recruited Spy
SENIOR ENGINEER - R&D DIVISION
Unexplained foreign travel - 3 trips in 6 months
Contacted via LinkedIn by foreign national (handler)
Accessing classified project files outside his clearance
Encrypted USB drives found on premises
Financial windfall unexplained by known income sources
RISK: IP THEFT - ESPIONAGE
PROFILE - MIT-004 // ACTIVE
🧑🏫
The Privileged Abuser
HELPDESK ADMIN - OPERATIONS
Resetting executive passwords without ticket authorization
Sold admin credentials on dark web forum (detected by CTI)
Logging into executive accounts using shared service creds
Forwarding C-suite emails to external address
Purchasing cryptocurrency with work equipment
RISK: CRED SALE - ACCESS BROKER
PROFILE - MIT-005 // ACTIVE
👨⚕️
The Healthcare Fraudster
BILLING SPECIALIST - HOSPITAL NETWORK
Accessing patient records unrelated to assigned caseload
Viewed 3,200 patient SSNs over 4 months
Submitting fraudulent insurance claims using real patient IDs
Second job found at competing clinic with same patient data
Emailing patient records to personal Gmail account
RISK: HIPAA BREACH - IDENTITY FRAUD
PROFILE - MIT-006 // ACTIVE
🧑💼
The Saboteur
DEVOPS ENGINEER - INFRASTRUCTURE
Termination notice issued - 2 weeks remaining
Creating backdoor admin accounts in production systems
Modified infrastructure-as-code with time-delayed deletion
Revoked SSH keys for other team members
Accessed prod database with DROP TABLE commands staged
RISK: SABOTAGE - LOGIC BOMB
2013 - NSA CONTRACTOR
Edward Snowden
NSA / BOOZ ALLEN HAMILTON
NSA contractor used his sysadmin access and a web crawler to exfiltrate 1.5 million classified documents over several months. Exploited coworker credentials to access compartments beyond his clearance. Ideologically motivated - revealed mass surveillance programs to journalists.
Files: 1.5M classified
Motive: Ideology
Tenure: 3 months at NSA
2020 - TESLA / GIGAFACTORY
Egor Kriuchkov
TESLA GIGAFACTORY - EXTERNAL RECRUITER
Russian criminal offered Tesla employee $1M in cash to plant malware on the Nevada Gigafactory network as part of a ransomware operation. The targeted employee reported the approach to Tesla and the FBI - Kriuchkov was arrested. Rare case of employee integrity foiling the plot.
Offer: $1M BTC
Method: Recruitment / Coercion
Outcome: Foiled - employee reported
2022 - CISCO SABOTAGE
Sudhish Kasaba Ramesh
CISCO SYSTEMS - FORMER ENGINEER
Cisco engineer resigned, then five months later used retained AWS credentials (never revoked) to log into Cisco's production environment and deploy code that deleted 456 virtual machines running WebEx Teams. Caused $1.4M in damages, took 2 weeks to restore service for 16,000 customers.
Damage: $1.4M / 16K customers
Access: Credentials never revoked
Sentence: 24 months federal prison
2023 - FINANCIAL SECTOR
JPMorgan Chase - Data Theft
JPMORGANCHASE - WEALTH MANAGEMENT
A wealth management associate exfiltrated customer account data for 9 months, emailing client financial information including account balances, portfolio holdings, and PII to a personal Gmail account. Used legitimate client access portals - no special tools required. Sold information to investment competitors.
Duration: 9 months undetected
Method: Legitimate portals + Gmail
Motive: Financial - competitor sale
👁️
UEBA - Behavioral Analytics
User and Entity Behavior Analytics establishes individual baselines and alerts on deviations - after-hours access, bulk downloads, unusual query patterns. Context-aware: correlates HR events (PIP, notice) with access anomalies in real time.
🔐
Privileged Access Management (PAM)
All privileged actions require checkout through a PAM vault (CyberArk, BeyondTrust). Sessions recorded, commands logged, credentials rotated automatically. Prevents credential sharing and provides full session replay for forensic investigation.
📤
Data Loss Prevention (DLP)
Block or alert on bulk file transfers to USB, personal cloud storage, and webmail. Content inspection identifies sensitive data (SSNs, card numbers, IP) in outbound transfers. Network DLP monitors encrypted uploads and unusual data volumes at the egress point.
🚪
Immediate Revocation on Departure
All accounts, tokens, VPN certificates, and cloud credentials revoked on the employee's last minute - not days later. Automated offboarding workflow triggered by HRIS. The Cisco Ramesh case was entirely enabled by credentials active 5 months post-resignation.
🔗
HR–Security Integration
Bidirectional data sharing between HR and the SOC. PIPs, denied promotions, termination notices, and formal complaints automatically trigger elevated monitoring and privilege reviews. The security team treats HR events as threat intelligence signals.
🔍
Least Privilege & Need-to-Know
Grant access only to resources required for the current role. Regular access certification reviews remove accumulated permissions. Just-in-time (JIT) access for sensitive operations: elevated privileges granted only for the duration of an approved task, then auto-revoked.
📋
Database Activity Monitoring
Log ALL query types including SELECT - not just DDL. Alert on: bulk SELECT with no WHERE clause, queries outside business hours, queries from unusual IP addresses, and export operations. Marcus's extraction would have been detected on night one with proper DAM coverage.
🛡️
Logic Bomb Prevention
Audit all scheduled tasks, cron jobs, and SQL Agent jobs before and after any employee departure. Require two-person approval for scheduled destructive operations in production environments. Scan for time-delayed code during offboarding of privileged technical staff.
🔒
Immutable Centralized Logging
Forward all security events to a centralized SIEM in real time - separate from systems the insider controls. WORM (Write-Once-Read-Many) log storage that cannot be deleted even by administrators. Marcus's local log clearing had zero impact because the SIEM already had everything.