pwshub.com

Feds claim sinister sysadmin locked up thousands of PCs

A former infrastructure engineer who allegedly locked IT department colleagues out of their employer's systems, then threatened to shut down servers unless paid a ransom, has been arrested and charged after an FBI investigation.

Daniel Rhyne, 57, of Kansas City, Missouri, now faces up to 35 years behind bars for the alleged failed ransom attempt after being charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud.

According to court documents [PDF], Rhyne hatched the scheme in November 2023 while working for an unnamed industrial company, headquartered in Somerset County, New Jersey.

His extortion scheme commenced at around 1600 EST on November 25, 2023, it's claimed, when network admins received password reset notifications for a domain administrator account and hundreds of user accounts. About 44 minutes later, the company's employees received an email with the subject line: "Your Network Has Been Penetrated."

The email warned workers that all IT admins were locked out, or had their accounts deleted, and all backups had been erased. Then came the threat to shut down 40 servers a day until a ransom was paid.

Rhyne allegedly scheduled tasks to delete 13 domain administrator accounts and change the passwords belonging to 301 domain user accounts and two local admin accounts. This would lock these users out of 254 Windows servers.

The suspected sinister sysadmin also changed passwords for two other local admin accounts that would affect 3,284 workstations, and shut down "several" servers and workstations over several days beginning in December 2023, prosecutors claimed.

Rhyne is said to have used Windows' net user and Sysinternals Utilities' PsPasswd tool to modify these accounts and change the passwords to "TheFr0zenCrew!"

Very creative. But perhaps he should have let it go, if the Feds are right, because they claim they traced a hidden virtual machine used to remotely access an admin account back to Rhyne's company-issued laptop. He also used the same password, "TheFr0zenCrew!" for this compromised account.

  • Brain Cipher claims attack on Olympic venue, promises 300 GB data leak
  • Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear
  • Dick's Sporting Goods discloses cyberattack
  • Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The court documents also detail Rhyne's alleged web search history, which prosecutors said included lookups for phrases including, "command line to change password," "command line to change local administrator password," and "command line to remotely change local administrator password."

(Note to self: Don't Google "how to dispose of a body without getting caught.")

Additionally, the firm's security cameras and access logs allegedly recorded Rhyne entering the building immediately before logging into his company laptop, conducting suspicious searches, and looking at company password spreadsheets, while also accessing the hidden VM.

Rhyne made his initial court appearance in Kansas City federal court on August 27.

The charge of extortion in relation to a threat to cause damage to a protected computer carries a maximum penalty of five years in prison and a $250,000 fine. The charge of intentional damage to a protected computer carries a max penalty of 10 years and a $250,000 fine. And the wire fraud offense carries a max sentence of 20 years behind bars and a $250,000 fine. ®

Source: theregister.com

Related stories
1 month ago - The takedown may be small but any ransomware gang sent to the shops is good news in our book The Dispossessor ransomware group is the latest to enter the cybercrime graveyard with the Feds proudly laying claim to the takedown.…
3 weeks ago - The government-backed crew also enjoys ransomware as a side hustle Iranian government-backed cybercriminals have been hacking into US and foreign networks as recently as this month to steal sensitive data and deploy ransomware, and...
1 week ago - Feds post $10 million bounty for each of the six's whereabouts The US today charged five Russian military intelligence officers and one civilian for their involvement with the data-wiping WhisperGate campaign conducted against Ukraine in...
1 month ago - Authorities allege 'J.P. Morgan' practiced ‘extreme operational and online security’ The US has charged a suspect they claim is a Belarusian-Ukrainian cybercriminal whose offenses date back to 2011.…
1 week ago - Elderly people report the greatest losses The FBI just dropped its annual report examining the costs of crypto-related cybercrime, painting a predictably grim picture as total losses in the US exceeded $5.6 billion in 2023 – a 45 percent...
Other stories
45 minutes ago - Experts at the Netherlands Institute for Radio Astronomy (ASTRON) claim that second-generation, or "V2," Mini Starlink satellites emit interference that is a staggering 32 times stronger than that from previous models. Director Jessica...
45 minutes ago - The PKfail incident shocked the computer industry, exposing a deeply hidden flaw within the core of modern firmware infrastructure. The researchers who uncovered the issue have returned with new data, offering a more realistic assessment...
45 minutes ago - Nighttime anxiety can really mess up your ability to sleep at night. Here's what you can do about it right now.
45 minutes ago - With spectacular visuals and incredible combat, I cannot wait for Veilguard to launch on Oct. 31.
45 minutes ago - Finding the perfect pair of glasses is difficult, but here's how to do so while considering your face shape, skin tone, lifestyle and personality.