trusted formEngineer Arrested for Attempted $750K Bitcoin Extortion | Several.com
Although we earn commissions from partners, we ensure unbiased evaluations. More on our 'How We Work' page
Missouri Engineer Charged In Failed 750k Bitcoin Extortion

Missouri Engineer Charged in Failed $750K Bitcoin Extortion

Missouri Engineer Charged in Failed $750K Bitcoin ExtortionMissouri Engineer Charged in Failed $750K Bitcoin Extortion
Engineer Arrested for Attempted Bitcoin Extortion

Published On: September 3, 2024

A former engineer from Missouri, Daniel Rhyne, has been charged with multiple offenses following a failed attempt to extort $750,000 in Bitcoin from his previous employer. Rhyne, 57, allegedly used his technical expertise to gain unauthorized access to the systems of an industrial company based in Somerset County, New Jersey, where he had previously worked as a core infrastructure engineer.

On November 25, 2023, Rhyne sent an extortion email to the company, claiming to have locked out the IT administrators and deleted critical data backups. He demanded 20 Bitcoin, worth approximately $750,000 at the time, threatening to shut down an additional 40 servers each day if the ransom was not paid. The investigation revealed that Rhyne had used a hidden virtual machine to remotely access and manipulate the company’s systems, changing administrator passwords and scheduling shutdowns.

Rhyne's actions were traced back to his company-issued laptop, which he allegedly used to research methods for altering passwords and clearing logs. Following his arrest on August 27, 2024, Rhyne was charged with extortion, intentional damage to a protected computer, and wire fraud. He faces a maximum sentence of 35 years in prison and a fine of up to $750,000.

Strengthening your cybersecurity strategy

This case provides an important lesson for businesses and individuals on the importance of a comprehensive cybersecurity strategy. Here are a few key takeaways that can help you bolster your defenses against similar threats:

  • Implement Multi-Factor Authentication (MFA): Adding an extra layer of security through MFA can significantly reduce the risk of unauthorized access. This simple step requires users to provide additional verification, making it harder for attackers to breach systems even if they obtain passwords
  • Regularly update and patch systems: Keeping software and systems updated is critical in closing vulnerabilities that could be exploited by insiders or external attackers. Regular patching ensures that any known security flaws are addressed promptly
  • Conduct regular security audits: Regular audits help identify potential vulnerabilities within your organization’s IT infrastructure. These audits should include reviewing access logs, monitoring unusual activities, and ensuring that only authorized personnel have access to critical systems
  • Establish a clear incident response plan: Having a well-defined response plan in place ensures that your organization can act quickly in the event of a breach. This plan should include steps for isolating affected systems, communicating with stakeholders, and restoring operations as efficiently as possible

Related Topics

Recent Posts