Ex-Intel Employee Allegedly Stole 18,000 Confidential Files Before Leaving

Ex-Intel Employee Allegedly Stole 18,000 Confidential Files Before Leaving

Jinfeng Luo, a former software engineer of Intel Corporation, has been accused of accessing over 18,000 confidential files, many marked “Top Secret,” on the eve of his termination in July 2024.

The suit alleges that Luo made his first transfer a week prior to his exit, but it was blocked by Intel security. He was able to complete the transfer three days later using a NAS device.

Intel seeks damages of at least $250,000, along with the return of the stolen materials.

Engineering Role Gave Access to Core Architecture and Roadmaps

Luo has been employed by Intel since 2014, and during this period, was in a position that could have granted him access to critical internal systems and proprietary documentation.

The lawsuit observed that Human Resources notified Luo of his impending termination, after which he began to quickly access a considerable amount of confidential technical files. He encoded the data and exported it through an external storage unit, maximizing on this narrow window of opportunity during Intel’s workforce reduction.

Security Gaps Highlighted by Company Off-boarding Process

The incident underscores a larger risk for tech firms related to insiders leaving the company who might exploit access while off-boarding processes are still smoothly running. Industry analysts note that the case surged amid workforce cuts and cost-control drives at Intel, a period when keeping tabs may be tedious.
eSecurity Planet
Even with proper tools for data-loss prevention (DLP) put in place, the comment from this expert noted: “Insider threats often are successful when processes, monitoring, and privilege reduction do not keep pace with personnel changes.”

Legal Security Implications Beyond Just Intel

Legal documents show that Intel wants the Court to order Luo to surrender his personal devices for inspection and disappearance of the stolen files.

For the larger tech sector, this period raises questions regarding trusted-user monitoring, privilege diminution for departing employees, and readiness to respond when sensitive data is moved. The files possibly contained commercially sensitive trade secrets, manufacturing-roadmap information and architecture specifications: In other words, a tangible risk to competitive advantage has been consummated.

Main Lessons Traumatized Companies Should Take from the Intel Case

Some lessons that companies should take away include promptly revoking termination-related access and monitoring large file exports through employees with high privileges; checking for external-storage connectivity during these important processes; and maintaining a clear off-boarding checklist encompassing HR, IT, and security. Cybersecurity commentary goes on to comment that, in cases like this, technology is often not the weakest link: it is the coordinated process under stress.
eSecurity Planet

This case serves as a stark reminder that even large organizations with advanced security tools are vulnerable to insider threats. With Intel pursuing its lawsuit and possibly recovering a small fragment of the 18,000 files alleged to have been taken, the rest of the industry is watching, both as an exceedingly cautionary tale and as a call for tightening defenses.
Also Read: A Step-by-Step Guide About How To Login to Sophos Account
News Source: Pcmag.com

Leave a Reply

Your email address will not be published. Required fields are marked *

Social Share Buttons and Icons powered by Ultimatelysocial
Pinterest
Pinterest
fb-share-icon
Instagram