A former worker responsible for the central infrastructure of an industrial company based in Somerset County, New Jersey, admitted his guilt after a extortion plan that ended up blocking the access of Windows administrators to hundreds of company teams. According to the judicial documents published by the Office of the Prosecutor, the accused, identified as Daniel Rhyne, acted from his administrative account and programmed a series of tasks that massively altered credentials and accounts in the corporate network between early and late November 2023. Official information is available at the documents of the court and in the note by the New Jersey District Attorney's Office on his plea of guilt: DOJ communication.
The maneuver was not a simple password change: forensic records show that Rhyne programmed tasks on the domain controller to remove domain administrators' accounts and to force the re-establishment of credentials in hundreds of user accounts and administrators, replacing them with a key identified in the investigation. In addition, he handled local administrator accounts whose alteration affected thousands of workstations and 254 servers, and left random off orders for equipment in subsequent days. All this was followed by a mail sent by Rhyne himself to several colleagues on 25 November, in which he stated that the administrators had been blocked and that the backup had been deleted, demanding a bitcoin rescue in exchange for stopping the planned blackouts.

The research detected searches from hidden virtual devices and machines related to how to delete Windows records, change domain passwords from the command line and remove domain accounts. These fingerprints on systems and the timing of actions were decisive for researchers in rebuilding the internal attack. After his arrest in August, Rhyne pleaded guilty to federal charges, which, if they reach a full sentence, entail imprisonment of up to 15 years, according to the Prosecutor's Office.
This case highlights a lesson that is repeated in similar incidents: the greatest risk is not always a sophisticated external actor, but someone with privileges and knowledge of the network. When the infrastructure manager uses its access to cause intentional damage, traditional defences may be insufficient. Tools and practices such as segregation of functions, strict control of privileged accounts, automatic and unique rotation of local passwords, and provision of dedicated workstations for administrative tasks are measures that reduce the area of attack of insiders. Microsoft, for example, offers solutions to manage local passwords from administrators such as LAPS, and documentation on Active Directory security practices that can help companies to tighten their environments: Microsoft LAPS and Active Directory security guides in Microsoft documentation.
Prevention also involves support strategies that resist deliberate elimination, as well as continuous monitoring and detection of anomalies in administrative actions. The US Agency for Infrastructure and Cybersecurity. USA (CISA) publishes recommendations and road maps on how to deal with Ransomware and the risk of internal threats, which are useful for organizations of all sizes: CISA guide and resources on Ransomware. Implement multifactor for administrative access, separate daily use accounts from privileged accounts and apply the principle of lower privilege are basic but effective steps to limit potential damage.
Beyond technical controls, this episode serves as a reminder of the importance of clear policies on remote access and periodic privilege reviews. An employee with network knowledge and permanent access can turn that experience into a weapon if there are no adequate detection and containment barriers. Forensic investigations that revealed specific searches and the use of hidden virtual machines show that, on many occasions, the digital trail exists and can lead to criminal responsibilities when there is bad faith.

Cases such as this are not unique: in recent months other incidents have come to light where workers or subcontractors have tried to take advantage of privileged data or access. The accumulation of these events has prompted organizations to rethink the management of privileged identities and accesses, as well as to strengthen their incident response plans to ensure rapid recovery without giving in to extortion.
The reading of the official documents and the notes of the Office of the Prosecutor provides a direct view of how the attack took place and what evidence the author had pointed to: for those who wanted to deepen, the Department of Justice kept the communiqués and the annexes of the case on its website (see DOJ's link on the plea of guilt and judicial documents partners).
If there is a clear conclusion, it is that technological security requires not only perimeter barriers, but also rigorous internal controls, continuous monitoring and an organizational culture that detects and acts against risk signals. The combination of good technical practices and human surveillance is the best defense against attacks that, precisely to be born from within, seek to take advantage of the greatest asset that companies have: confidence in their own staff.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...