Former Employee Pleads Guilty to Insider Hacking and Extortion of US Industrial Company
- Guilty plea: A 59-year-old Missouri man entered a guilty plea for executing an internal network compromise and subsequent extortion attempt.
- Targeted cyberattack execution: The operations involved a severe cyberattack on industrial company networks, deploying scheduled tasks to delete administrative credentials and shut down servers.
- Significant legal consequences: This hacking and extortion case carries severe cybercrime legal consequences, including a potential 15-year combined prison sentence and substantial financial penalties.
A former core infrastructure engineer at a U.S.-based industrial company entered a guilty plea to charges of extortion and intentional damage to a protected computer. Daniel Rhyne, 59, appeared before a U.S. District Judge in Trenton federal court, following a major development in an internal network compromise investigation regarding the unnamed company headquartered in New Jersey.
Cyberattack on Industrial Company Infrastructure
According to court documents, Rhyne, formerly residing in New Jersey, used his position as a core infrastructure engineer at a U.S.-based industrial company to hack and extort their employer. The individual reportedly scheduled malicious tasks via unauthorized remote desktop sessions, which included:
- Deleting network administrator accounts,
- Changing passwords to certain other company accounts,
- Shutting down multiple company servers.
In November 2023, he proceeded to deploy these tasks and sent an extortion email to colleagues. He threatened to sustain the server outages unless the U.S. organization transferred approximately 20 bitcoin, valued at $750,000 at the time of the incident.
Cybercrime Legal Consequences
The extortion charge carries a maximum of 5 years in prison, while the intentional damage violation carries a potential 10-year sentence. Furthermore, Rhyne faces maximum fines of $250,000 per violation, or twice the gross gain or loss from the offense, emphasizing the judicial system's stringent response to internal infrastructure sabotage.
This high-stakes hacking and extortion case highlights the severe vulnerability of insider threats within enterprise environments. Last month, a former employee of cybersecurity companies was charged in an ALPHV (BlackCat) Ransomware extortion case.
An ex-Coinbase support agent was arrested in India over an insider data breach in December. In November 2025, CrowdStrike confirmed an insider threat incident linked to Scattered Lapsus$ Hunters and fired an employee amid claims of a data leak.




