He expected an AD password change to stop them and evoke a ransom? And he did all the crap from a VM on his own computer?
Sounds like he has the planning capabilities of a preteen. I wonder if someone else in his house or family got a hold of his credentials and pulled this off…
I dunno, I know a bunch of “senior” administrators that would be this blindingly stupid.
They just assume they’re smarter than everyone and thus don’t need to do anything to hide their shit because nobody could possibly figure out what they’re doing.
So far I’ve yet to meet one that’s actually right about that.
He could have picked up a black market encryption package, installed it through some vulnerability that he would be aware of through a sufficiently remote proxy and no one would have been the wiser.
But instead he reenacted scary movie it’s coming from inside the house.
The problem is no matter how much it looks like it’s a remote service he’s going to be right then and there in the center of the investigation. He is suspect number one and two.
Everyone thinks the people there before them are idiots. They will say the same about you in a few years.
Logs into baddy remote on his own laptop, on camera.
This guy needs something but prison time ain’t it. This is the dumbest plan since just grabbing the cash and trying to run right past the casino guards.
Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom
I’ve changed the title from the auto-suggested one to the one in the article.