Skip Navigation

ITMG Insider Threat Cases – April 1, 2022

Samsung Electronics Employee Allegedly Caught Stealing Trade Secrets

A Samsung Electronics employee has been found to be illegally retaining data, some of which was deemed to be protected trade secrets, says a report from KoreaJoongAngDaily. The employee, who was scheduled to leave the company soon, took the opportunity to make a quick buck by photographing confidential data when working from home.

Former Pfizer Staffers Counter Pharma Giant’s ‘Belated and Ill-Founded’ Trade Secrets Case

Denied, denied, denied—and a countersuit. That’s the response Regor Therapeutics has offered to Pfizer’s lawsuit claiming two former employees who now run the Chinese biotech committed “treachery” by claiming the Big Pharma’s work as their own.

Regor’s work in this area has since secured the nascent biotech a deal with Eli Lilly worth $1.5 billion.

NIH-Backed HDT Bio Sues Indian Partner for $950M, Alleging it Stole Trade Secrets

HDT Bio has a COVID-19 vaccine candidate and some National Institutes of Health funding to develop it. But its chosen manufacturing partner stole trade secrets and co-opted the shot—or so the company claims in a lawsuit filed Monday in a Washington state federal court.

The lawsuit says HDT Bio tapped Gennova Biopharmaceuticals, an Emcure Pharmaceuticals subsidiary, to manufacture portions of its COVID vaccine. Gennova didn’t hold up its end of the deal, the lawsuit claims. Instead, Gennova and Emcure took HDT’s technology and claimed the vaccine as their own.

Chinese Government Employee Convicted of Participating in Conspiracy to Defraud the United States and Fraudulently Obtain U.S. Visas

A federal jury convicted a New Jersey man for his involvement in a conspiracy to fraudulently obtain U.S. visas for Chinese government employees.

According to court documents and evidence presented at trial, Zhongsan Liu, 59, of Fort Lee, participated in a scheme to fraudulently procure J-1 research scholar visas for employees of the government of the of the People’s Republic of China (PRC) to enable them to unlawfully work for the PRC government in the United States and to conceal that unlawful work from the United States and its agencies.

Addiction Treatment Facility Operators Sentenced in $112 Million Addiction Treatment Fraud Scheme

According to court documents and evidence presented at trial, the defendants conspired to unlawfully bill for approximately $112 million of addiction treatment services that were medically unnecessary and/or never provided, which were procured through illegal kickbacks at two addiction treatment facilities, Second Chance Detox LLC, dba Compass Detox (Compass Detox), an inpatient detox and residential facility, and WAR Network LLC (WAR), a related outpatient treatment program. The defendants obtained patients through patient recruiters who offered illegal kickbacks to patients, including free airline tickets, illegal drugs, and cash payments. The defendants shuffled a core group of patients between Compass Detox and WAR in a cycle of admissions and re-admissions to fraudulently bill for as much as possible. Patient recruiters gave patients illegal drugs prior to admission to Compass Detox to ensure admittance for detox, which was the most expensive kind of addiction treatment offered by the defendants’ facilities. In addition, therapy sessions were billed for but not regularly provided or attended, and excessive, medically unnecessary urinalysis drug tests were ordered, billed for, and paid. Compass Detox patients were given a so-called “Comfort Drink” to sedate them, and to keep them coming back. Patients were also given large and potentially harmful amounts of controlled substances, in addition to the “Comfort Drink,” to keep them compliant and docile, and to ensure they stayed at the facility.

Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide

A June 2021 indictment returned in the District of Columbia, United States v. Evgeny Viktorovich Gladkikh, concerns the alleged efforts of an employee of a Russian Ministry of Defense research institute and his co-conspirators to damage critical infrastructure outside the United States, thereby causing two separate emergency shutdowns at a foreign targeted facility. The conspiracy subsequently attempted to hack the computers of a U.S. company that managed similar critical infrastructure entities in the United States.

An August 2021 indictment returned in the District of Kansas, United States v. Pavel Aleksandrovich Akulov, et al., details allegations about a separate, two-phased campaign undertaken by three officers of Russia’s Federal Security Service (FSB) and their co-conspirators to target and compromise the computers of hundreds of entities related to the energy sector worldwide. Access to such systems would have provided the Russian government the ability to, among other things, disrupt and damage such computer systems at a future time of its choosing.

This entry was posted on Friday, April 1st, 2022 at 3:57 pm. Both comments and pings are currently closed.

Discover more from Insider Threat Management Group

Subscribe now to keep reading and get access to the full archive.

Continue reading