Learning Library

← Back to Library

Insider DBA Executes Lottery Scam

Key Points

  • The scam involved outside fraudsters buying winning lottery tickets at a small profit and colluding with an inside “bad actor” – a database administrator (DBA) – who inflated the ticket values in the system before cashing them.
  • After the fraudulent cash‑out, the DBA reverted the ticket values back to their original amounts, erasing obvious evidence of the manipulation.
  • Auditors eventually discovered the scheme when a consultant’s laptop captured the DBA’s activity logs, exposing the insider’s unauthorized changes.
  • Preventative measures discussed include stronger identity‑and‑access‑management controls, strict segregation of duties, and continuous monitoring and review of database logs to detect anomalous activity.

Full Transcript

# Insider DBA Executes Lottery Scam **Source:** [https://www.youtube.com/watch?v=9QEpg9PFHTU](https://www.youtube.com/watch?v=9QEpg9PFHTU) **Duration:** 00:04:26 ## Summary - The scam involved outside fraudsters buying winning lottery tickets at a small profit and colluding with an inside “bad actor” – a database administrator (DBA) – who inflated the ticket values in the system before cashing them. - After the fraudulent cash‑out, the DBA reverted the ticket values back to their original amounts, erasing obvious evidence of the manipulation. - Auditors eventually discovered the scheme when a consultant’s laptop captured the DBA’s activity logs, exposing the insider’s unauthorized changes. - Preventative measures discussed include stronger identity‑and‑access‑management controls, strict segregation of duties, and continuous monitoring and review of database logs to detect anomalous activity. ## Sections - [00:00:00](https://www.youtube.com/watch?v=9QEpg9PFHTU&t=0s) **Insider Database Lottery Scam** - An external group buys winning lottery tickets at a discount while a colluding database administrator inflates the ticket values, cashes the profit, and then resets the amounts to evade detection. - [00:03:04](https://www.youtube.com/watch?v=9QEpg9PFHTU&t=184s) **Zero Trust, Auditing, and AI** - The speakers explain how logs, Zero Trust architecture, continuous auditing, and AI-driven anomaly detection create a proactive security foundation, illustrating the approach with IBM Guardium. ## Full Transcript
0:00If you've been following this channel, 0:01there's no doubt you've probably seen one or more of our cybersecurity videos featuring Jeff Crume, 0:07and one thing he loves to talk about are bad actors. 0:10And today, I've invited an expert in this field to explain how one of these bad actors actually pulled off a lottery scam. 0:18Can you explain it to us? Yep. 0:20So my name is Ebenezer Grover Hewitt, and I'm a cybersecurity specialist at IBM. 0:24In this lottery scam, there was an organization losing a lot of money out their lotteries. 0:29And the way that was happening was because of bad actors on the outside and a bad actor from the inside, 0:35which is a database administrator. 0:37And the way this would happen is there would be winning numbers. 0:41Okay, so for example, this is a winning ticket. 0:43Great. Yep. 0:44So these winners would sell their tickets, their winning numbers to the group of scammers. 0:50They'd sell them for, like, $4 more so they'd buy them for $5. 0:53I see. So they're happy they made a few dollars. 0:56Exactly. 0:57And these scammers would then call the database administrator, 1:01and this person from the inside would change the values from $1 to $100, for example. 1:05I see. And then they cash in the ticket. 1:07Exactly. 1:08With a $95 profit. Exactly. Pretty sweet. 1:11And now you ask the question, "But wouldn't they get caught if they keep on leaving it [like that]?" 1:15Right, right, right! 1:16Exactly. So the database administrator would then go and remove the zeros 1:20and change it back to the value of how it initially was. 1:24So they did that right after they cashed, so there's no evidence left behind. 1:27Exactly. 1:28So what's the next part of this story? 1:30Yeah. So that lottery group brings in consultants and audit group, 1:36and they keep on auditing the different things that were happening. 1:40Initially, they thought it was the circle thing that, 1:42Oh, yeah. The balls a mix up to get a random number. Sure! 1:45Exactly. So they thought those numbers were fixed, but actually wasn't. 1:49So then they thought it was an IT issue in the background. 1:53So then they bring in an auditor and they check the database. 1:58What happens is the auditor plugs in his laptop and sees everything that was going on. 2:03So this DBA is now being watched. 2:05But he doesn't know it. 2:07Okay. 2:07So he was changing these numbers and he was getting the log files of everything that was happening. And then he got caught. 2:14Okay, so that's the end of his story. 2:17But the next part of the story is how could they have prevented this in the first place? 2:20Yeah. So there might have been something they might have done right with the identity and access management [IAM]. 2:25We could say that the database administrator had the right access to the database. 2:30So that verifies you're the right person and you have the proper authority. 2:33But in this case, we had a bad actor on the inside. 2:36Exactly. 2:37I see. So points for that. But IAM didn't solve the problem. 2:41Yep. That did not solve the problem. 2:43So what they could have been doing is they could have been reviewing the log files 2:46because they would have logged everything that was changing in the database. 2:50And that would have been able to help them detect exactly what was going on, especially with changing the numbers. 2:57Well, especially in this particular case, you have a database table 3:01which is supposedly not going to change at all. 3:04Exactly. 3:04I see. So logs would have helped them detect. 3:07Yes. And this falls under the bigger umbrella of the Zero Trust architecture, 3:12which states "trust no one" 3:15even people inside of your perimeter, not only on the outside. 3:19So IAM was mostly about maintaining a perimeter. 3:22This next step with Zero Trust is really about putting that across to everyone. 3:26Yes, exactly. 3:27I see it over the last step. 3:28Audit + AI. What does that mean? 3:30So you probably heard Jeff say that security is not an afterthought. 3:36Instead, it's something that we should build our infrastructure on. 3:40And they should have had a process of auditing and maybe an AI system 3:47that would tell them-- a detection of an anomaly or something that was out of the ordinary. 3:53So, for example, an AI system that looks for a change, it shouldn't be occurring at a certain time or change occurs very rapidly. 4:00Exactly. 4:00I see. 4:01That would have notified them of the issue. 4:04Okay, so you get the final word. What would you recommend to our viewers? 4:08I mean, they have to deal with security. 4:10How should they approach it? 4:11Yeah. So thanks for that. 4:13So like I mentioned before, security should not be an afterthought 4:16Instead, it should be something that we build our foundation on. 4:19At IBM we use IBM Guardium for our security suite. 4:24To learn more about it, check down the link below.