Andrew Beato


anonymous

Guest
Can you give us an idea of what information you’d like to have as it relates to the Sun Pharma case?

Last time OIG was investigating, I clearly had been wiped from the HR database as a former employee.

I can assure you, and I’ve got no skin in the game here, but based on title alone, there’s absolutely no way they would not have wanted to speak with me. I know where some major bones are buried.
 

You don’t summon the ghost of Ranbaxy unless someone thinks the Feds are about to write a sequel with Sun now playing the lead.
 
He could feel the Feds closing in and chose to return to the wife rather than share a cell with Diddy in the near term.
If the Feds really are closing in, now’s the best time for him to walk away and for the evidence to disappear. It’s unlikely India would agree to extradite him, so he could sail off into the sunset. He’ll probably go down in history as the longest-serving U.S. CEO to remain in power while simultaneously settling insider trading allegations with India’s stock exchange—alongside his wife.
 
If the Feds really are closing in, now’s the best time for him to walk away and for the evidence to disappear. It’s unlikely India would agree to extradite him, so he could sail off into the sunset. He’ll probably go down in history as the longest-serving U.S. CEO to remain in power while simultaneously settling insider trading allegations with India’s stock exchange—alongside his wife.
Yeah, technically a ‘CEO’, but does anyone consider Sun a real pharma company?
No.

Regardless, his wife Kiran must be pleased he’s ‘home’
I’m sure she’d love to see him at Rikers Island.

You got some splainin’ to do Ahbay!
 
The company says some data was deleted, but this is not correct. Files are not deleted — they are hidden using root-level permissions. Directories are renamed and chmod set so regular users or auditors cannot see. Dhilibhai gave instruction. In some cases, files were exported to external storage (USB or encrypted SSDs) and removed from server view. At Sun House Mumbai, there is already a scripted kill-switch installed — it runs wipe commands on key servers if triggered. It is prepared, not yet used.

There is a blind spot in their monitoring. If someone gets physical or elevated access to a local server room — like Princeton — it is possible to extract full data copy with no detection in real-time. Logging is not live. They rely on cron jobs to push syslog and audit trails back to Mumbai every 60 minutes. No centralized SIEM. No file integrity monitoring. File servers are unencrypted at rest. If attacker uses admin credentials and pulls via rsync, SCP, or block-level imaging, no flag is raised immediately. Only when Mumbai runs reconciliation scripts, someone might notice — but by that time, copy is done.

Most employees believe their laptops are secure because they see TeamViewer installed, and think that is the only access method. But TeamViewer is just window dressing. Sun uses internal remote tools — including headless VNC sessions, scheduled PowerShell jobs, and local service accounts with full disk access. These allow silent entry into employee machines anytime. Files can be browsed, copied, edited, or deleted without user knowing. There is no user notification, and access logs are stored centrally, not locally. So the employee never sees it.

The data exists — but it will not remain long if outside pressure begins. They have planned for deletion already
 
The company says some data was deleted, but this is not correct. Files are not deleted — they are hidden using root-level permissions. Directories are renamed and chmod set so regular users or auditors cannot see. Dhilibhai gave instruction. In some cases, files were exported to external storage (USB or encrypted SSDs) and removed from server view. At Sun House Mumbai, there is already a scripted kill-switch installed — it runs wipe commands on key servers if triggered. It is prepared, not yet used.

There is a blind spot in their monitoring. If someone gets physical or elevated access to a local server room — like Princeton — it is possible to extract full data copy with no detection in real-time. Logging is not live. They rely on cron jobs to push syslog and audit trails back to Mumbai every 60 minutes. No centralized SIEM. No file integrity monitoring. File servers are unencrypted at rest. If attacker uses admin credentials and pulls via rsync, SCP, or block-level imaging, no flag is raised immediately. Only when Mumbai runs reconciliation scripts, someone might notice — but by that time, copy is done.

Most employees believe their laptops are secure because they see TeamViewer installed, and think that is the only access method. But TeamViewer is just window dressing. Sun uses internal remote tools — including headless VNC sessions, scheduled PowerShell jobs, and local service accounts with full disk access. These allow silent entry into employee machines anytime. Files can be browsed, copied, edited, or deleted without user knowing. There is no user notification, and access logs are stored centrally, not locally. So the employee never sees it.

The data exists — but it will not remain long if outside pressure begins. They have planned for deletion already
This sounds completely plausible.

OIG better hurry.
 


Write your reply...