UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice

Stu Sjouwerman | Jun 15, 2023

Cybercriminal ArrestThe recent conviction of a U.K. man for cyber crimes committed in 2018 brings to light a cyber attack where this attacker manually performed the “in-the-middle” part of an attack.

We’ve all heard of a “Man-in-the-Middle” (MitM) attack – also more recently called a “Manipulator-in-the-Middle” attack.  These attacks involve attackers using some form of tech to intercept communications, manipulate them for their own devious purposes, and control a conversation between two systems, networks, entities or people.

The recent conviction of 28-year old U.K. would-be cybercriminal, Ashley Liles shows us that sometimes attacks can be accomplished “old school," where old fashioned manual intervention is all that’s needed for an attack. 

According to the conviction details, in 2018, Liles employer became the victim of a ransomware attack.  Liles’ role was IT Security Analyst, working alongside law enforcement to respond to and mitigate the attack.  But Liles himself intercepted a board member’s email over 300 times, altering the payment details on blackmail emails in an attempt to have the ransom paid to himself.

Liles’ downfall was access logs showing that access to the board member’s email had been accomplished from his home.

Sure, this kind of twist in a ransomware attack is not probable, but it does make the case that organizations should always maintain and audit security logs, don’t fall victim to a ransomware attack in the first place, and implement new-school security awareness training to teach your users how to avoid these types of attacks.

Topics: Ransomware

Ransomware Simulator

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.