Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice

    The recent conviction of a U.K. man for cyber crimes committed in 2018 brings to light a cyber attack where this attacker manually performed the “in-the-middle” part of an attack.

    We’ve all heard of a “Man-in-the-Middle” (MitM) attack – also more recently called a “Manipulator-in-the-Middle” attack.  These attacks involve attackers using some form of tech to intercept communications, manipulate them for their own devious purposes, and control a conversation between two systems, networks, entities or people.

    The recent conviction of 28-year old U.K. would-be cybercriminal, Ashley Liles shows us that sometimes attacks can be accomplished “old school,” where old fashioned manual intervention is all that’s needed for an attack. 

    According to the conviction details, in 2018, Liles employer became the victim of a ransomware attack.  Liles’ role was IT Security Analyst, working alongside law enforcement to respond to and mitigate the attack.  But Liles himself intercepted a board member’s email over 300 times, altering the payment details on blackmail emails in an attempt to have the ransom paid to himself.

    Liles’ downfall was access logs showing that access to the board member’s email had been accomplished from his home.

    Sure, this kind of twist in a ransomware attack is not probable, but it does make the case that organizations should always maintain and audit security logs, don’t fall victim to a ransomware attack in the first place, and implement new-school security awareness training to teach your users how to avoid these types of attacks.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 23 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top