Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Desperate Extortion Scheme: The Shocking Case of Daniel Rhyne's Windows Extortion Plot


A former core infrastructure engineer has pleaded guilty to locking thousands of Windows devices in an extortion plot, highlighting the growing threat of insider threats in today's digital landscape.

  • Rhyne, a former core infrastructure engineer, pleaded guilty to orchestrating an audacious extortion scheme involving the locking of thousands of Windows devices.
  • Rhyne remotely accessed his employer's network without authorization using an administrator account and scheduled tasks to delete network admin accounts and change passwords to a seemingly innocuous phrase.
  • He emailed coworkers threatening to shut down servers unless they paid a ransom of $750,000 in bitcoin within ten days.
  • The attack highlights the ever-present threat of insider threats, emphasizing the need for adequate security measures to prevent such incidents.
  • Rhyne's guilty plea carries a maximum penalty of 15 years in prison, underscoring the severity of this crime.



  • A recent revelation has left security experts and law enforcement agencies stunned, as a former core infrastructure engineer has pleaded guilty to orchestrating an audacious extortion scheme involving the locking of thousands of Windows devices. At the center of this scandal is 57-year-old Daniel Rhyne, who hails from Kansas City, Missouri, and was arrested in August 2023 after his initial appearance in federal court.

    According to court documents, Rhyne's plan involved remotely accessing his employer's network without authorization using an administrator account between November 9 and November 25. Over this period, he allegedly scheduled tasks on the company's Windows domain controller to delete network admin accounts and to change the passwords for 13 domain admin accounts and 301 domain user accounts to a seemingly innocuous phrase - "TheFr0zenCrew!".

    The prosecutors' case against Rhyne paints a chilling picture of a calculated scheme to extort his employer. On November 25, Rhyne emailed a number of his coworkers a ransom email titled "Your Network Has Been Penetrated", stating that all IT administrators had been locked out of their accounts and that server backups had been deleted to make data recovery impossible. The emails threatened to shut down 40 random servers daily over the next ten days unless the company paid a ransom of 20 bitcoin (worth roughly $750,000 at the time).

    Rhyne's plan was designed to maximize the impact on his employer's business, with scheduled tasks to change the passwords for two local admin accounts, which would affect 3,284 workstations, and for two more local admin accounts, which would impact 254 servers on the network. Furthermore, he also scheduled some tasks to shut down random servers and workstations on the network over multiple days in December 2023.

    In a bizarre twist, investigators discovered that Rhyne had been searching the web for information on clearing Windows logs, changing domain user passwords, and deleting domain accounts just weeks before his extortion plot. One week earlier, he made similar web searches on his laptop, including "command line to remotely change local administrator password" and "command line to change local administrator password".

    This brazen attack highlights the ever-present threat of insider threats in today's digital landscape. According to various reports, insider threats are becoming increasingly common, with many organizations failing to implement adequate security measures to prevent such incidents.

    In light of this case, it is clear that cybersecurity awareness and training for employees must be taken seriously. Employers should ensure that their workforce is equipped with the necessary skills and knowledge to identify potential security risks and report suspicious activity without hesitation.

    The fact that Rhyne was able to execute his plan with relative ease highlights a critical vulnerability in many organizations' cybersecurity posture. The incident serves as a stark reminder of the importance of adopting robust security measures, including regular software updates, patch management, and multi-factor authentication.

    Rhyne's guilty plea carries a maximum penalty of 15 years in prison, underscoring the severity of this crime. As law enforcement agencies continue to crack down on such cases, it is essential that organizations prioritize their cybersecurity posture and take proactive steps to prevent similar incidents from occurring in the future.

    In conclusion, Daniel Rhyne's shocking extortion scheme involving the locking of thousands of Windows devices serves as a stark reminder of the ever-present threat of insider threats. As we move forward, it is crucial that organizations focus on implementing robust security measures to prevent such incidents and ensure the protection of their digital assets.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Desperate-Extortion-Scheme-The-Shocking-Case-of-Daniel-Rhynes-Windows-Extortion-Plot-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/man-admits-to-extortion-plot-locking-coworkers-out-of-thousands-of-windows-devices/

  • https://www.theregister.com/2024/08/29/vm_engineer_extortion_allegations/?td=readmore


  • Published: Fri Apr 3 04:40:18 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us