{
	"id": "01023fc8-b34e-4071-a513-d7ff892734d1",
	"created_at": "2026-04-06T15:52:57.458519Z",
	"updated_at": "2026-04-10T13:11:28.789441Z",
	"deleted_at": null,
	"sha1_hash": "237654dabde2082e46f9e9b10e0dce94cb530499",
	"title": "San Jose Man Pleads Guilty To Damaging Cisco’s Network",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33676,
	"plain_text": "San Jose Man Pleads Guilty To Damaging Cisco’s Network\r\nPublished: 2020-08-26 · Archived: 2026-04-06 15:14:16 UTC\r\nSAN JOSE – Sudhish Kasaba Ramesh pleaded guilty in federal court in San Jose today to intentionally accessing\r\na protected computer without authorization and recklessly causing damage, announced United States Attorney\r\nDavid L. Anderson and Federal Bureau of Investigation Special Agent in Charge John L. Bennett. \r\nAccording to the plea agreement, Ramesh admitted to intentionally accessing Cisco Systems’ cloud infrastructure\r\nthat was hosted by Amazon Web Services without Cisco’s permission on September 24, 2018.  Ramesh worked\r\nfor Cisco and resigned in approximately April 2018.  During his unauthorized access, Ramesh admitted that he\r\ndeployed a code from his Google Cloud Project account that resulted in the deletion of 456 virtual machines for\r\nCisco’s WebEx Teams application, which provided video meetings, video messaging, file sharing, and other\r\ncollaboration tools.  He further admitted that he acted recklessly in deploying the code, and consciously\r\ndisregarded the substantial risk that his conduct could harm to Cisco.  As a result of Ramesh’s conduct, over\r\n16,000 WebEx Teams accounts were shut down for up to two weeks, and caused Cisco to spend approximately\r\n$1,400,000 in employee time to restore the damage to the application and refund over $1,000,000 to affected\r\ncustomers.  No customer data was compromised as a result of the defendant’s conduct.\r\nRamesh, 30, of San Jose, California, was charged by Information on July 13, 2020.  He was charged with one\r\ncount of Intentionally Accessing a Protected Computer Without Authorization and Recklessly Causing Damage, in\r\nviolation of 18 U.S.C. §§ 1030(a)(5)(B) and (c)(4)(A)(i)(I).\r\nUnder the plea agreement, Ramesh pled guilty to the sole count of the Information.\r\nRamesh is currently released on bond.   Bail was set at $50,000. \r\nRamesh’s sentencing hearing is scheduled for December 9, 2020, before The Honorable Lucy H. Koh, U.S.\r\nDistrict Court Judge, in San Jose.  The maximum statutory penalty for the offense of Intentionally Accessing a\r\nProtected Computer Without Authorization and Recklessly Causing Damage, in violation of 18 U.S.C. §§ 1030(a)\r\n(5)(B) and (c)(4)(A)(i)(I), is 5 years imprisonment  and a fine of $250,000.  However, any sentence will be\r\nimposed by the court only after consideration of the U.S. Sentencing Guidelines and the federal statute governing\r\nthe imposition of a sentence, 18 U.S.C. § 3553.\r\nSusan Knight is the Assistant U.S. Attorney who is prosecuting the case with the assistance of Elise Etter.  The\r\nprosecution is the result of an investigation by the Federal Bureau of Investigation.  Cisco Systems, Inc. fully\r\ncooperated with the U.S. Attorney’s Office and Federal Bureau of Investigation.\r\nSource: https://www.justice.gov/usao-ndca/pr/san-jose-man-pleads-guilty-damaging-cisco-s-network\r\nhttps://www.justice.gov/usao-ndca/pr/san-jose-man-pleads-guilty-damaging-cisco-s-network\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.justice.gov/usao-ndca/pr/san-jose-man-pleads-guilty-damaging-cisco-s-network"
	],
	"report_names": [
		"san-jose-man-pleads-guilty-damaging-cisco-s-network"
	],
	"threat_actors": [],
	"ts_created_at": 1775490777,
	"ts_updated_at": 1775826688,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/237654dabde2082e46f9e9b10e0dce94cb530499.pdf",
		"text": "https://archive.orkl.eu/237654dabde2082e46f9e9b10e0dce94cb530499.txt",
		"img": "https://archive.orkl.eu/237654dabde2082e46f9e9b10e0dce94cb530499.jpg"
	}
}