Security & Infrastructure Tools
Former Engineer Pleads Guilty After Locking Out 254 Windows Servers in Extortion Plot
Former core infrastructure engineer Daniel Rhyne pleaded guilty to hacking an industrial company’s network, locking out 254 servers and 3,284 workstations by changing admin passwords and deleting domain accounts, then sending ransom emails demanding $750,000 in Bitcoin; he faces up to 15 years in prison.

A former core infrastructure engineer has admitted his role in an audacious extortion plot that left thousands of Windows administrators locked out of critical systems across a large industrial network. The case centers on a 57-year-old man from Kansas City, Missouri, who remotely accessed his employer’s network without authorization, wreaking havoc on the company’s Windows environment over a span of several weeks in late 2023.
According to court documents, the individual conducted his unauthorized access between November 9 and November 25, 2023. During this period, he is alleged to have scheduled tasks on the company’s Windows domain controller with the explicit aim of crippling the IT administration capability. Among the actions attributed to him were deletions of network admin accounts and extensive password changes: he targeted 13 domain administrator accounts and 301 domain user accounts, changing their passwords to a static value intended to be difficult to recover from. The scope of the disruption widened as he reportedly changed passwords on two local administrator accounts affecting 3,284 workstations, and altered passwords for two additional local admin accounts impacting 254 servers on the employer’s network. The plan also allegedly included scheduling tasks to shut down random servers and workstations over multiple days in December 2023.
The alleged operation culminated in a ransom demand that spilled into the company’s inboxes on November 25. An email labeled “Your Network Has Been Penetrated” warned that all IT administrators had been locked out of their accounts and that server backups had been deleted, making data recovery nearly impossible. The message threatened to shut down 40 random servers daily for the next ten days unless the company paid a ransom of 20 bitcoin, a sum estimated at roughly $750,000 at the time. The prosecutors described how, on or about November 25, 2023, the company’s network administrators began receiving password reset notifications for a domain administrator account and hundreds of user accounts within the Victim-1 environment, followed shortly by the discovery that all domain administrator accounts had been deleted, denying access to the network’s control structure.
Forensic investigators pieced together how the plot unfolded. They found that on November 22, the suspect used a hidden virtual machine and his account to search the web for techniques to clear Windows logs, change domain user passwords, and delete domain accounts—precursors to the extortion scheme. Earlier in the week, similar searches were conducted on his laptop, including queries about the command-line methods to remotely change local administrator passwords. These actions painted a picture of careful planning aimed at maximizing disruption while keeping the attackers’ tracks as concealed as possible.
The man was arrested in Missouri on August 27, after an initial appearance in federal court, and he subsequently pleaded guilty to charges related to hacking and extortion. The plea carries a potential maximum penalty of 15 years in prison. The case stands alongside other recent cybersecurity-related prosecutions, including a separate incident in which a North Carolina data-analyst contractor was found guilty of extorting Brightly Software, a SaaS company formerly known as SchoolDude, for $2.5 million.
The legal proceedings underscore the vulnerability of large, multi-tenant IT environments to insider threats and remotely executed attacks. The pattern in this case—accessing a domain controller, manipulating administrative accounts, and threatening operational shutdowns with a cryptocurrency ransom—highlights the kinds of disruptions that modern organizations must guard against, including the risks posed by insiders who already have a foothold in the network. The financial and operational stakes are high, as evidenced by the scale of the password changes and the breadth of devices affected, spanning thousands of workstations and hundreds of servers.
The included chronology of events—initial intrusion in early November 2023, a dramatic escalation in late November with a public ransom note, and a series of calculated actions designed to degrade administrative control—illustrates how quickly a compromised foothold can cascade into a company-wide crisis. As investigations continue and sentences are handed down, the case serves as a stark reminder of the need for rigorous access controls, continuous monitoring of administrative activity, and robust backup and logging practices to detect and mitigate such threats before they can escalate into full-blown extortion attempts.