
"Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities."
"He threatened employees by claiming to have deleted all backups and demanded bitcoin, highlighting the severity of the extortion."
"Consultants noted that the techniques Rhyne used were commonplace, indicating a failure in standard security measures that should have blocked such actions."
Daniel Rhyne pleaded guilty to an insider extortion attack against his employer, employing techniques such as unauthorized remote desktop sessions, deletion of network administrator accounts, and password changes. He threatened to shut down servers unless paid in bitcoin worth approximately $750,000. The concerning aspect of this case is the routine nature of the techniques used, which standard security procedures should have prevented.
Read at Computerworld
Unable to calculate read time
Collection
[
|
...
]