DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home News

IT Analyst’s Blackmail Scheme Exposed

Reading Time: 2 mins read
in News

Ashley Liles, a 28-year-old IT security analyst, pleaded guilty to unauthorized access and blackmail charges in England’s Reading Crown Court. While working at Oxford Biomedica, Liles attempted to extort his employer by changing ransom notes and substituting his own cryptocurrency wallet address.

After a hack attack, Liles, who was part of the incident response team, launched a separate attack and manipulated a board member’s private emails to pressure the company into paying the ransom. Investigators traced the activity back to Liles’ home and recovered evidence from wiped devices.

Insider Threats Highlight Need for Strong Incident Response The case serves as a reminder of the importance of prepared incident response plans, vigilant monitoring, and adherence to security controls in the face of cyberattacks. Brian Honan, CEO of BH Consulting, commended Oxford Biomedica for detecting the unauthorized access.

Organizations must not abandon security processes and controls during a response to a cyberattack, as attackers may exploit vulnerabilities. Incident response experts have encountered similar cases where ransomware attacks turned out to be orchestrated by insiders attempting to cover up financial fraud.

Deterring Cybercrime and Safeguarding Organizations The guilty plea from Liles sends a clear message that cyber experts will thoroughly investigate and bring those responsible for such crimes to justice.

Detectives emphasize the need for organizations to have a robust incident response strategy in place, including adherence to security protocols, constant monitoring, and prompt detection of unexpected activities. Cybersecurity experts warn against compromising security measures for the sake of convenience during incident response, as insider threats can pose significant risks.

The case serves as a reminder that insider abuses can occur within organizations, requiring continuous vigilance to safeguard against such incidents.

Read More

Tags: blackmailCyberattackEnglandMay 2023NewsNews 2023RansomwareVulnerabilities
ADVERTISEMENT

Related Posts

Memcyco Raises $10M for Website Security

Memcyco Raises $10M for Website Security

May 26, 2023
Unveiling Android Spyware ‘Predator’

Unveiling Android Spyware ‘Predator’

May 26, 2023
FinFisher Executives Indicted

FinFisher Executives Indicted

May 26, 2023
Enhancing Software Security with GUAC

Enhancing Software Security with GUAC

May 26, 2023

More Articles

Watering Hole Attacks

January 3, 2021
Document

Cyber Security Incident Response Plan

August 11, 2022
Podcast

Blockchain Disruption Daily

February 24, 2021
Tool

Endpoint Detection and Response (EDR)

August 11, 2022
Alerts

Emotet malware campaign impersonates the IRS for 2022 tax season

March 16, 2022
Alerts

Google Releases Security Updates for Chrome

March 2, 2022

The Evil Tester Show

June 28, 2022
Alerts

IBM security advisory (AV22-227)

April 25, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.