Tuesday, November 26, 2024
HomeCyber CrimeMalwareTech Researcher, Who Stopped WannaCry Ransomware, Gets no Jail Time Over Malware...

MalwareTech Researcher, Who Stopped WannaCry Ransomware, Gets no Jail Time Over Malware Charges

Published on

Malwaretech researcher, Marcus Hutchins, gets one year supervised release for charges on his role in making and selling the banking malware Kronos and UPAS Kit. In April he pleaded guilty to two counts of creating malware.

The Kronos malware available in the dark web markets since 2014 for $7,00, the malware has keylogging, formgrabbing and VNC capabilities. It steals users login credentials while accessing banking services.

Marcus Hutchins is known for registering a kill switch domain in 2017 which halted the massive WannaCry ransomware which hits several organizations around the world.

- Advertisement - SIEM as a Service

Marcus Hutchins Arrested

Hutchins is a British citizen, he got arrested by FBI a few months after the WannaCry attack, while boarding a flight from Las Vegas to the UK after attending Def Con cyber-security conference.

Since the time he got arrested, he was on bail and remains in the U.S, during his bail time he shared his malware analysis skills with infosec community, he published various in-depth malware analysis methods.

According to the court documents, he developed malware between 2012 – 2015, before he started his carrier in cybersecurity. In 2017 he was publically credited after stopping the WannaCry ransomware outbreak.

“Hutchins’ malware was purchased and used by hackers. Identifying individual attackers and victims is necessarily difficult because, as noted, sales to attackers were conducted through encrypted communications.”

“But, there is no confusion as to the criminal purpose behind the development and distribution of UPAS and Kronos. The ramifications of Hutchins’ inventions are still being felt today.”

https://twitter.com/MalwareTechBlog/status/1154820057085677570

Prosecutors said that “Hutchins no longer produces malware and instead uses his skills to combat malware attacks. This is a good thing.”

Prosecutors said that he has been served and he will face no jail time in his sentence and likely bar Hutchins from re-entering the United States.

https://twitter.com/MalwareTechBlog/status/1154822372823842821

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...