The British security researcher who inadvertently stopped the global WannaCry ransomware campaign in May, has pleaded not guilty to charges in the US of developing and distributing the ‘Kronos’ banking malware.
Marcus Hutchins, otherwise known as ‘Malwaretech’ on social media, was arrested by the FBI on 2 August in Nevada, after he attended the Black Hat and Def Con hacking conference in Las Vegas
During a hearing in Milwaukee, Wisconsin, Marcus Hutchins rejected six charges relating to the Kronos malware and will now face trial in October. Friends and family raised his £23,000 bail, the terms of which forbade him from using a computer. That restriction has now been lifted.
A second defendant is also included in the indictment, but their name has not been made public.
Essentially, the DoJ believes that Hutchins is responsible for the creation and distribution of Kronos on Internet forums.
This was a nasty piece of malware that was designed to steal banking login and other financial data from infected computers. It first came to prominence in 2014 after it posed as legitimate software in order to infect people’s computers.
What is your biggest cybersecurity concern?
Its creator boasted it could evade existing anti-virus software and said it worked with Internet Explorer, Firefox and Chrome web browsers. The creator also (unusually) promised to deliver free upgrades and bug fixes for the trojan, and even offered attackers a one week trial for $1,000.
Kronos resurfaced again in October 2015 after it reportedly attacked both British and Indian banking websites.
Then in May 2016 it hit customers of Canadian financial institutions, and last November Kronos was apparently being distributed in emails sent to financial service firms, hospitality businesses, as well as those companies operating in the higher education and healthcare industries.
It has been suggested by some that code written by Hutchins was ‘stolen’ and incorporated into Kronos.
If found guilty, Hutchins could be jailed for 40 years.
The fact that the FBI believes that Hutchins was responsible for this trojan has come as a surprise to many.
When the WannaCry ransowmware spread rapidly through computer systems around the world in May, it crippled huge swathes of NHS IT infrastructure. As the ransomware attack began to take hold, Hutchins obtained a sample of the malware from a fellow researcher.
Hutchins then tested the ransomware in a virtual environment and discovered it queried an unregistered domain. He had noted the malware was connecting to multiple IP addresses targeting a server message block (SMB) vulnerability.
He then registered the domain, an action which ultimately resulted in the botnet being terminated. Hutchins actions only emerged days after the first WannaCry attacks.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…