Rogue IT safety employee who impersonated ransomware gang is sentenced to jail • Graham Cluley


Rogue IT security worker who impersonated ransomware gang sentenced to jail

A British IT employee who exploited a ransomware assault towards the corporate he labored for, in an try and extort cash from them for himself, has been sentenced to jail for 3 years and 7 months.

As I beforehand described on the “Smashing Safety” podcast, gene and cell remedy agency Oxford Biomedica suffered a ransomware assault in February 2018.

A hacker accessed Oxford Biomedica’s programs, stole data, and senior members of the corporate acquired a ransom demand from the hacker.

Nothing uncommon about that.

Oxford Biomedica tasked its IT staff to work alongside the police in investigating the assault, decide the way it had occurred, and attempt to plug any remaining safety holes to forestall future breaches.

Once more, up to now so regular.

However what was decidedly uncommon was that certainly one of its employees assigned to research the ransomware assault determined to truly exploit the state of affairs, and trick his employer into giving him the ransom cash as a substitute of the real hackers.

Liles accessed the e-mail account of an Oxford Biomedica board member, and altered the unique ransom demand to direct that the cash ought to be paid to a Bitcoin pockets below his personal management, quite than that of the hackers.

This meant that if the corporate did finally determine to pay the ransom, it could find yourself with Liles quite than the (presumably lower than joyful) hackers who had initiated the assault.

Signal as much as our free e-newsletter.
Safety information, recommendation, and ideas.

Liles additionally created an nearly an identical electronic mail deal with to that utilized by the unique hacker, and commenced emailing his employer to pressurise them to pay a ransom value £300,000.

As a part of their investigation, specialist officers from the UK’s SEROCU (the South East Regional Organised Crime Unit’s Cyber Crime Unit) recognized that somebody had been accessing the board member’s electronic mail, after which traced the entry again to Liles’ dwelling deal with.

Yup, plainly this explicit IT safety analyst didn’t correctly cowl his tracks.

A subsequent search of Liles’s dwelling uncovered laptop tools, a telephone, and USB stick. Regardless of Liles’s makes an attempt to wipe incriminating knowledge from his units, digital forensic analysts had been in a position to get better sufficient proof to show his involvement within the extortion.

Ashley Liles of Fleetwood, Letchworth Backyard Metropolis, Hertfordshire, was sentenced yesterday at Studying Crown Courtroom for blackmail and unauthorised entry to a pc with intent to commit different offences.

It’s a fairly exceptional story. Liles wasn’t linked to the preliminary ransomware assault, it merely occurred on his watch. After which – some would say displaying competing quantities of initiative and recklessness – he tried to hijack the ransomware assault towards his personal employer to his personal profit.

What a dumb factor to do.

Discovered this text attention-grabbing? Observe Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we publish.


Graham Cluley is a veteran of the cybersecurity business, having labored for a lot of safety corporations for the reason that early Nineties when he wrote the primary ever model of Dr Solomon’s Anti-Virus Toolkit for Home windows. Now an impartial analyst, he repeatedly makes media appearances and is an worldwide public speaker on the subject of cybersecurity, hackers, and on-line privateness.
Observe him on Twitter, Mastodon, Bluesky, or drop him an electronic mail.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles