• About
  • Privacy Policy
Open Security Labs
No Result
View All Result
No Result
View All Result
Open Security Labs
No Result
View All Result
Home Uncategorized

Fired Disney Worker’s Revenge Hack: Menus Tampered with Wingdings and Dangerous Allergy Info (0penBuckets)

Hriday Nakka by Hriday Nakka
2nd November 2024
in Uncategorized
0
Disney
466
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter
  1. Ex-Employee Hacks Menus with Wingdings and False Allergy Information
  2. Unauthorized Access and Account Lockouts Amid a Digital Attack
  3. FBI Investigation Reveals VPN Link and Personal Information Files
  4. Disney Avoids Crisis as Menu Tampering is Discovered in Time
  5. Lessons in Security: Swift Action Required When Employees Exit
  6. Scheuer Faces Federal Charges as Investigation Continues

In a shocking turn of events, a former Disney employee stands accused of hacking into the company’s restaurant menu systems, tampering with digital displays, and potentially endangering lives. Michael Scheuer, who was recently terminated from his role as a menu production manager at Disney World, allegedly accessed the company’s systems, using his knowledge of Disney’s passwords and wreaking havoc. The incident highlights a critical issue: the need for companies to promptly change credentials upon an employee’s exit.

Ex-Employee Hacks Menus with Wingdings and False Allergy Information

After his contentious departure from Disney in June, Scheuer allegedly logged into Disney’s menu creation system. Using his retained access, he reportedly made disruptive changes, including setting all fonts to the Wingdings symbol font, which rendered the menus unreadable. Additionally, he altered allergy information, creating potentially dangerous scenarios for diners with food sensitivities. According to authorities, QR codes on menus were also redirected to a boycott website, causing further confusion.

Disney quickly discovered the breaches, realizing that their menu creation software had been tampered with. To continue operations, Disney had to revert to manual menu creation processes, which led to a major inconvenience for both the staff and the restaurant patrons.

Unauthorized Access and Account Lockouts Amid a Digital Attack

Investigators discovered that, on July 3, 2024, a user connected through Mullvad VPN accessed Disney’s system, creating a new user account under the fictitious name “Emily P Beaman.” Later, on August 29, several Disney employees were suddenly locked out of their accounts due to a denial-of-service (DoS) attack that employed a script to attempt tens of thousands of logins. The accounts were locked down, and it was noted that many of the affected individuals had past interactions with Scheuer or held upper-management roles at Disney.

As the DoS attack continued, authorities tracked the activity back to Scheuer. The attack ceased just minutes before FBI agents arrived at his home with a search warrant on September 23.

FBI Investigation Reveals VPN Link and Personal Information Files

When agents searched Scheuer’s home, they found computers with Mullvad VPN installed, which had been used in the attacks. In addition, one of the computers contained a folder labeled “dox” on its desktop, holding files with personal data of four individuals involved in the attack. Scheuer claimed that he might have accessed Disney’s system post-termination to retrieve personal data, though he denied hacking allegations and insisted Disney was framing him.

Interestingly, soon after learning that his Google account would be searched, Scheuer was reportedly seen parked outside one of his DoS targets’ homes, checking their doorstep and giving a thumbs-up to their video doorbell. The incident, combined with cellphone data that placed Scheuer in the area, was enough to alarm the victim, who chose to temporarily relocate for safety.

Disney Avoids Crisis as Menu Tampering is Discovered in Time

Fortunately, none of the tampered menus made it into the hands of restaurant guests. Disney intercepted the corrupted files, potentially averting a public relations disaster and preventing possible harm. Yet, this case underscores the importance of updating access controls and removing privileges immediately when an employee departs, particularly if the exit is contentious.

Lessons in Security: Swift Action Required When Employees Exit

The Disney hacking incident illustrates a stark reality: former employees can pose a significant security threat, especially if companies fail to revoke access promptly. The risks aren’t limited to data breaches but can extend to physical safety, as evidenced by the altered allergy information.

For companies, this incident serves as a crucial reminder that stringent access control policies and immediate action upon employee termination are essential. Routine security audits and clear protocols for access revocation can be the first line of defense against such breaches.

Scheuer Faces Federal Charges as Investigation Continues

Michael Scheuer currently remains in federal custody, with his bond motion hearing scheduled for November 5, 2024. The case is a stark reminder of the vulnerabilities companies face if they overlook former employees’ access rights. Swift, strategic action can prevent data manipulation, protect customer safety, and uphold the integrity of corporate systems.

Disney

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Email a link to a friend (Opens in new window) Email

Related


Discover more from Open Security Labs

Subscribe to get the latest posts sent to your email.

Previous Post

Apple Defends Its Vision Pro Users: Major Security Boost in visionOS 2.1 Update

Next Post

🚨 5 SaaS Misconfigurations You Can’t Afford to Overlook 🚨

Related Posts

CyberStalking
Uncategorized

The Dark Reality of Cyberstalking: How to Stay Safe on Social Media (0penBuckets)

29th December 2024
Volkswagen
Uncategorized

Massive Data Exposure from Volkswagen Electric Cars Highlights Cloud Security Risks (0penBuckets)

29th December 2024
amazon
Uncategorized

Dangerous Android Malware Found on Amazon Appstore – Steals Your Data in Disguise! (0penBuckets)

21st December 2024
Live Sports
Uncategorized

Massive Live Sports Piracy Ring Shut Down – Over 821 Million Visits Annually!”

21st December 2024
BellaCPP
Uncategorized

BellaCPP: The C++ Malware That’s Redefining Cyber Threats (0penBuckets)

21st December 2024
Docker
Uncategorized

Mastering Docker Security: Essential Tips for Unbreakable Containers (0penBuckets)

21st December 2024
Next Post
SaaS

🚨 5 SaaS Misconfigurations You Can’t Afford to Overlook 🚨

Leave a ReplyCancel reply

  • About
  • Privacy Policy

© 2024 OpenSecurityLabs.com

No Result
View All Result
  • About
  • Privacy Policy

© 2024 OpenSecurityLabs.com

Discover more from Open Security Labs

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from Open Security Labs

Subscribe now to keep reading and get access to the full archive.

Continue reading

 

Loading Comments...