A recent BBC news item has drawn attention to an alarming tactic: hackers are now trying to recruit insiders to hand over login credentials in return for a payment or share of ransom. The proposition is chilling: essentially, “help us break in, and you’ll get a cut.” Such approaches turn employees (or contractors) into vectors for attack, intentionally or under coercion.
This is not just an “IT problem.” When a person is approached in this way, the incident should be surfaced, escalated, documented - and treated as a serious business / governance risk. If organisations rely solely on isolated IT incident reports, they risk losing visibility, consistency and insight. That’s where a system like Continual can help as a single source of truth; capturing these threats, enabling escalation, spotting trends, and ensuring that the right stakeholders are alerted.
The BBC story is stark. Hackers used encrypted messaging apps to contact a target, offering a share of ransom funds in exchange for login access. In part, the approach is psychological: they promise large rewards, play on doubt, make it seem low-risk, and try to emotionally or financially entice someone. They may even escalate pressure via authentication popups, threat of exposure, or account lockouts.
It’s a clever manoeuvre. Even if the target resists, the interaction itself is an indicator of an attempted compromise; one organisations must treat seriously. If such attempts go unreported, or are handled ad hoc, they may mask deeper vulnerabilities: insider recruitment, credential reuse, phishing escalation, or replay attacks.
When someone is approached or threatened, that must not just reside in an IT ticketing queue. Here are key reasons why escalation via a central process is essential:
Below is how a tool like Continual can play a pivotal role — not by replacing security tools, but by bridging human risk, governance and escalation in one coherent flow.
When someone is approached with a login request or offer, they can immediately file a concern via a lightweight interface: whether via desktop, mobile or web. They don’t need to navigate clunky ticketing systems or find an unfamiliar security contact.
The reporter can supply structured fields: date/time, communication channel (Signal, SMS, email, phone), content (copy/paste or screenshot if safe), names or pseudonyms, device or account targeted, and any suspicious indicators. Optional anonymity can also be supported, depending on policy.
Continual can route the concern automatically based on severity or type (e.g. internal vs external approaches) to predefined roles: Security Ops, Legal, Risk, IT, or senior management. SLA timers, reminders and escalation rules help ensure it doesn’t stall.
Decision-makers can monitor open cases, response times, unresolved items, bottlenecks, and case histories. They can filter by department, reporter type, or approach vector to see where threats cluster.
Over time, Continual captures data which can feed into trend reports: spike in attempts directed at certain teams, repeated targeting of accounts, or phishing/spoofing vector frequencies. These insights help sharpen preventive controls, training and policy.
Where needed, Continual can integrate with IT/Security tools (SIEM, ticket systems) so that handoffs or updates propagate. All actions are logged (who viewed, who escalated, who commented) for audit and compliance purposes.
Because Continual is organisational (not just technical), HR, legal, risk committees, internal audit or board-level recipients can be configured to receive summaries or alerts—making sure the right eyes see pertinent security risks involving people approaches, not just system alerts.
Implementing such a system well requires care. A few key recommendations:
The BBC case of hackers offering a cut of ransom to staff in exchange for login access is a telling example of human-targeted threat vectors. Organisations that treat such approaches as mere IT tickets are missing the bigger picture: they are business, governance, risk and trust events, too.
By adopting a centralised, human-aware reporting system like Continual, organisations can ensure that approaches are captured when fresh, routed properly, tracked, and fed into strategic insight. The result: greater visibility, trend detection, accountability, faster escalation, and, ultimately, a more resilient posture against emerging insider threats.
If your organisation faces or fears such tactics, embedding a clear, easy reporting and escalation path is not optional: it’s a strategic imperative.
Experience the power of supplementing your ethics and compliance program with AI. Schedule a personalised demo now to see how our advanced platform can give you clearer risk insights and better corporate governance.
We are also available on the details below.