UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice



Cybercriminal ArrestThe recent conviction of a U.K. man for cyber crimes committed in 2018 brings to light a cyber attack where this attacker manually performed the “in-the-middle” part of an attack.

We’ve all heard of a “Man-in-the-Middle” (MitM) attack – also more recently called a “Manipulator-in-the-Middle” attack.  These attacks involve attackers using some form of tech to intercept communications, manipulate them for their own devious purposes, and control a conversation between two systems, networks, entities or people.

The recent conviction of 28-year old U.K. would-be cybercriminal, Ashley Liles shows us that sometimes attacks can be accomplished “old school," where old fashioned manual intervention is all that’s needed for an attack. 

According to the conviction details, in 2018, Liles employer became the victim of a ransomware attack.  Liles’ role was IT Security Analyst, working alongside law enforcement to respond to and mitigate the attack.  But Liles himself intercepted a board member’s email over 300 times, altering the payment details on blackmail emails in an attempt to have the ransom paid to himself.

Liles’ downfall was access logs showing that access to the board member’s email had been accomplished from his home.

Sure, this kind of twist in a ransomware attack is not probable, but it does make the case that organizations should always maintain and audit security logs, don’t fall victim to a ransomware attack in the first place, and implement new-school security awareness training to teach your users how to avoid these types of attacks.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews