A former core infrastructure engineer has pleaded guilty to locking Windows admins out of 254 servers as part of a failed extortion plot targeting his employer, an industrial company headquartered in Somerset County, New Jersey. […]
You must log in or # to comment.
change the passwords for 13 domain admin accounts and 301 domain user accounts to “TheFr0zenCrew!”.
That’s about the easiest password to brute force though, I don’t think he thought through the plot hardly at all.


