A British IT employee who exploited a ransomware assault in opposition to the corporate he labored for, in an try to extort cash from them for himself, has been sentenced to jail for 3 years and 7 months.
As I previously described on the “Smashing Safety” podcast, gene and cell remedy agency Oxford Biomedica suffered a ransomware assault in February 2018.
A hacker accessed Oxford Biomedica’s programs, stole info, and senior members of the corporate obtained a ransom demand from the hacker.
Nothing uncommon about that.
Oxford Biomedica tasked its IT group to work alongside the police in investigating the assault, decide the way it had occurred, and attempt to plug any remaining safety holes to stop future breaches.
Once more, to this point so regular.
However what was decidedly uncommon was that one among its employees assigned to research the ransomware assault determined to really exploit the scenario, and trick his employer into giving him the ransom cash as an alternative of the real hackers.
Liles accessed the e-mail account of an Oxford Biomedica board member, and adjusted the unique ransom demand to direct that the cash ought to be paid to a Bitcoin pockets underneath his personal management, fairly than that of the hackers.
This meant that if the corporate did finally determine to pay the ransom, it could find yourself with Liles fairly than the (presumably lower than pleased) hackers who had initiated the assault.
Liles additionally created an nearly equivalent electronic mail tackle to that utilized by the unique hacker, and started emailing his employer to pressurise them to pay a ransom value £300,000.
As a part of their investigation, specialist officers from the UK’s SEROCU (the South East Regional Organised Crime Unit’s Cyber Crime Unit) recognized that somebody had been accessing the board member’s electronic mail, after which traced the entry again to Liles’ house tackle.
Yup, plainly this explicit IT safety analyst didn’t correctly cowl his tracks.
A subsequent search of Liles’s house uncovered laptop gear, a cellphone, and USB stick. Regardless of Liles’s makes an attempt to wipe incriminating information from his units, digital forensic analysts had been capable of recuperate sufficient proof to show his involvement within the extortion.
Ashley Liles of Fleetwood, Letchworth Backyard Metropolis, Hertfordshire, was sentenced yesterday at Studying Crown Courtroom for blackmail and unauthorised entry to a pc with intent to commit different offences.
It’s a fairly exceptional story. Liles wasn’t related to the preliminary ransomware assault, it merely occurred on his watch. After which – some would say displaying competing quantities of initiative and recklessness – he tried to hijack the ransomware assault in opposition to his personal employer to his personal profit.
What a dumb factor to do.
Discovered this text attention-grabbing? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we publish.