When a Suspended IT Admin Turns Rogue: Inside a 7‑Month Prison Sentence
A disgruntled IT worker in the UK exploited his privileged accounts after being suspended, causing massive system outages across multiple countries, incurring over £200,000 in losses, and was sentenced to seven months in prison, highlighting critical insider‑threat risks for organizations.
In software systems, the biggest variable is often people. While “deleting the database and running away” is a meme, real‑life insider retaliation can be far more damaging.
According to The Register, a 31‑year‑old IT worker named Mohammed Umar Taj was suspended by his employer in July 2022. The company failed to promptly revoke his privileged accounts.
Within hours Taj logged back into the company’s network, altered login credentials, and deliberately disrupted operations. The next day he changed system access rights and multi‑factor authentication settings, locking out employees and customers in Germany and Bahrain, causing severe business interruption.
The incident is estimated to have cost the company at least £200,000 (≈¥1.97 million) plus serious brand damage. West Yorkshire Police cyber‑crime detective Brantz described Taj as a typical disgruntled employee who used his system privileges to launch a chain reaction affecting overseas operations.
Taj pleaded guilty at Leeds Crown Court and was sentenced to seven months and 14 days in prison. Police evidence included his attack logs and recordings of him proudly describing the sabotage.
Similar retaliation cases have occurred. In 2021, a 29‑year‑old UK IT technician Adam Georgeson was dismissed, then hacked his former school’s system, deleting data and changing teacher passwords, and later attacked a new employer, disrupting employee logins and customer phone systems.
These incidents highlight a common oversight: many organizations do not immediately revoke system access when employees are terminated or suspended, leaving a dangerous window for “revenge attacks.”
Netizens warned that angry administrators should never be allowed back onto corporate networks, and that the presence of such grievances often signals deeper internal issues.
Experts stress that even the most advanced technology cannot prevent malicious intent; once privileged access is misused, the consequences can far exceed a simple outage.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
IT Services Circle
Delivering cutting-edge internet insights and practical learning resources. We're a passionate and principled IT media platform.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
