Ransomware gang asked BBC reporter for help in hacking media giant.

Medusa Ransomware Group Attempts to Recruit BBC Reporter as Insider

Cybercriminals Target Journalist with Lucrative Insider Offer

In a startling revelation, a BBC cybersecurity correspondent was approached by individuals claiming affiliation with the notorious Medusa ransomware collective. These threat actors attempted to entice the reporter into becoming an insider by promising a significant financial reward.

Plot to Exploit BBC’s Network via Insider Access

Joe Tidy, the BBC’s cybersecurity correspondent, disclosed that hackers intended to leverage his laptop as a foothold to infiltrate the broadcaster’s internal systems. Their ultimate goal was to exfiltrate sensitive data and demand a hefty ransom from the British public service broadcaster.

The cybercriminals proposed that Tidy would receive a minimum of 15% of any ransom paid, serving as compensation for granting initial access to the network.

Initial Contact and Escalating Incentives

In July, Tidy was contacted via the encrypted messaging app Signal by an individual using the alias “Syndicate.” This person offered the journalist a 15% cut of the ransom if Medusa successfully penetrated the BBC’s defenses. To sweeten the deal, Syndicate later increased the offer by an additional 10%, emphasizing the potential for ransom demands reaching tens of millions of dollars.

The threat actor painted a picture of financial independence for Tidy, suggesting that the payout could be so substantial it might allow him to retire from journalism altogether.

Background on Medusa Ransomware Operations

Medusa ransomware emerged in early 2021 and quickly gained notoriety for its double-extortion tactics-encrypting data while threatening to leak stolen information. In 2023, the group launched a dedicated extortion portal to pressure victims into paying.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported in March that Medusa has been linked to over 300 attacks targeting critical infrastructure across the United States. Their modus operandi involves recruiting initial access brokers from darknet marketplaces and cybercrime forums, focusing heavily on post-compromise exploitation.

Exploiting Insider Threats: A Common Ransomware Strategy

According to Tidy, the Medusa representative assured him of complete anonymity if he cooperated, referencing previous high-profile incidents where disgruntled or underpaid employees facilitated network breaches. This tactic exploits the reality that insider threats have caused millions in damages for relatively small sums.

Ransomware groups like LockBit have long sought out rogue employees willing to sell access, making insider recruitment a persistent challenge for organizations worldwide.

Escrow Offer and Persistent Coercion Attempts

Before any hacking attempt, Syndicate offered Tidy 0.5 Bitcoin (valued at over $55,000 at the time) held in escrow as a sign of good faith. The message was clear: “We are not bluffing or joking-we are solely motivated by financial gain, and one of our senior managers instructed me to contact you,” Syndicate wrote via Signal.

Believing the attackers may have mistaken him for a BBC employee with elevated privileges, Tidy declined to cooperate.

MFA Bombardment: A Tactic to Overwhelm and Bypass Security

Following his refusal, Tidy’s phone was inundated with multiple two-factor authentication (MFA) requests-a technique known as MFA fatigue or MFA bombardment. This method involves attackers automating login attempts to trigger a flood of authentication prompts, hoping the target will eventually approve one out of frustration or confusion.

Despite the relentless assault, Tidy remained vigilant and did not authorize any access.

Protective Measures and Aftermath

In response, Tidy alerted the BBC’s cybersecurity team, which promptly isolated his device from the broadcaster’s network as a precautionary measure. The Medusa representative later apologized for the MFA spam and reiterated that the offer to collaborate remained open for a limited time.

When Tidy did not respond further, the threat actor deleted their Signal account, ending communication.

Conclusion: Insider Threats Remain a Critical Security Concern

This incident underscores the ongoing risk posed by ransomware groups exploiting insider access. Organizations must continue to strengthen internal security protocols, employee awareness, and multi-factor authentication resilience to mitigate such sophisticated social engineering and cyberattack attempts.

More from this stream

Recomended