Rogue IT worker extorted company after hijacking ransomware attack
Liles’ involvement in the scheme was revealed after unauthorized email access was traced to his home address


An IT worker in the UK has been convicted of unauthorized computer access and blackmail after attempting to take advantage of a ransomware attack on his employer.
Ashley Liles was found to have attempted to blackmail his employer, Oxford Biomedica, into paying a ransom in the wake of a 2018 security breach.
In February that year, the Oxford-based company suffered a security incident that saw threat actors gain unauthorized access to the company’s computer systems.
Jurors at Reading Crown Court heard that, during an investigation into the incident, Liles commenced a secondary attack against the company.
“Liles began to investigate the incident, in his role as the company’s IT security analyst and worked alongside colleagues and the police to try to mitigate the incident,” according to a statement from the South East Regional Organized Crime Unit (SEROCU).
“However, unknown to the police, his colleagues, and his employer, Liles commenced a separate and secondary attack against the company.”
Liles accessed board members’ private emails more than 300 times and altered the original ransom note to change the payment address to his own cryptocurrency wallet.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Prosecutors said that Liles’ intention was that, if a payment was made, it would be made to him rather than the original attacker.
RELATED RESOURCE
The near and far future of ransomware business models
What would make ransomware actors change their criminal business models?
The security analyst was also found to have created an “almost identical” email address to the original ransomware attacker and began pressuring his employer to pay the ransom fee.
However, no payment was ever made and the unauthorized access to private emails was discovered, revealing that the access came from Liles’ home address.
A subsequent investigation by police officers from SEROCU’s cyber crime team arrested Liles in 2018 and conducted a search of his home.
Although digital devices were seized in the raid, Liles was found to have wiped all data from his devices to cover up his involvement in the scheme.
“Items seized from his address included a computer, laptop, phone and a USB stick,” SEROCU said.
“Liles had wiped all data from his devices just days before his arrest in order to try to hide his involvement, however the data was recovered and this provided direct evidence of his crimes.”
Liles initially denied his involvement despite this evidence being found, and did not plead guilty for around five years.
He is set to return to Reading Crown Court for sentencing on 11 July.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
M&S suspends online sales as 'cyber incident' continues
News Marks & Spencer (M&S) has informed customers that all online and app sales have been suspended as the high street retailer battles a ‘cyber incident’.
By Ross Kelly
-
Manners cost nothing, unless you’re using ChatGPT
Opinion Polite users are costing OpenAI millions of dollars each year – but Ps and Qs are a small dent in what ChatGPT could cost the planet
By Ross Kelly
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
By George Fitzmaurice
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
By ITPro
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
By ITPro
-
The complete guide to the NIST cybersecurity framework
Whitepaper Find out how the NIST Cybersecurity framework is evolving
By ITPro
-
Are you prepared for the next attack? The state of application security in 2024
Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro
-
The economics of penetration testing for web application security
whitepaper Get the most value from your security solution
By ITPro
-
How to extend zero trust to your cloud workloads
Whitepaper Implement zero trust-based security across your entire ecosystem
By ITPro
-
Four requirements for a zero trust branch
Whitepaper Effectively navigate the complex and ever-changing demands of security and network connectivity
By ITPro