Researcher Arrested
August 4, 2017 by

Researcher who found the Wannacry ‘Kill-Switch’ was arrested by FBI

Researcher who found the ‘Kill-Switch’ for Wannacry Ransomware was arrested by FBI. Marcus Hutchins, a 22-year-old British security researcher who gained worldwide fame for stopping the spread of the WannaCry Ransomware was arrested Wednesday in Nevada.  Hutchins who goes by the pseudo MalwareTech was arrested after attending the Def Con hacking conference in Las Vegas by the FBI at Las Vegas’ McCarran International Airport. 

Allegedly, Hutchins was arrested for creating the Kronos banking malware.  First discovered in July of 2014, the malware has the ability to steal banking details, Pin numbers, and credit card numbers. According, to the eight-page indictment, he has been accusing of  “creating and distributing the Kronos banking trojan.” 

Kronos was advertised on internet forums, including the AlphaBay dark web market, a forum that was just recently shut by law enforcement agencies.

Hutchins used YouTube as a platform to advertise and promote the features of the Kronos banking malware he had created. He posted the video on July 13, 2014, however, the original video was taken down. The same day he uploaded the video, Hutchins tweeted about Kronos saying, “Anyone got a kronos sample?”.

According to a federal indictment and corresponding Department of Justice press release, Hutchins has been charged with a six counts indictment after a two-year investigation. The indictment charges include:

“One count of conspiracy to commit computer fraud and abuse, three counts of distributing and advertising an electronic communication interception device, one count of endeavoring to intercept electronic communications, and one count of attempting to access a computer without authorization.” 

The security community is in shock and surprise after the arrest of Hutchines. Some saying, Hutchins could strain the relationship between white hat hackers.

 

About the author

Image of Author

LIFARS is the global leader in Digital Forensics and Cyber Resiliency Services. Our experience spans two decades working on high profile events, often in concert with Law Enforcement Agencies around the world. Our proprietary methodology derives directly and indirectly from our experience working with and for U.S. Intelligence Agencies, Interpol, Europol, and NATO. We are solely dedicated to Cyber Resiliency and thus pay close attention to all aspects of our clients’ engagements experience while providing a strategic and integrated array of services to minimum risk and disruption while protecting your brand.

Related articles

US Directly Blames North Korea for WannaCry Cyberattack

The White House under President Trump’s administration has blamed North Korea behind WannaCry -...

Read more arrow_forward

The UK’s NHS Toughens Cybersecurity Defenses after WannaCry Ransomware

The United Kingdom’s National Health Service (NHS) is set to spend £20 million on a new security...

Read more arrow_forward

UK Govt Blames North Korea for WannaCry Ransomware CyberAttack

  The UK government has blamed North Korea for WannaCry - the comprehensive ransomware...

Read more arrow_forward