Attacks/Breaches

6/7/2018
05:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

FBI Slaps New Charges Against Researcher Who Stopped WannaCry

Federal authorities charged Marcus Hutchins with lying to the government and authoring a second piece of malware in addition to the Kronos banking Trojan.

Any hopes that Marcus Hutchins, the British security researcher credited with stopping WannaCry, might have harbored about a quick resolution of a US malware case against him were dashed this week with the FBI slapping four new charges against him.

Federal authorities arrested Hutchins, 24, in Las Vegas last August and charged him with creating and distributing, Kronos - malware for stealing online banking credentials - between July 2014 and July 2015.

In a six-count indictment, federal prosecutors accused Hutchins of, among other things, conspiring to commit computer fraud, illegally accessing computers, and distributing and advertising an illegal communication-interception device.

Hutchins shot to fame last year when he almost serendipitously found a way to stop the WannaCry ransomware outbreak. Widely hailed as a hacker hero, Hutchins was in Las Vegas to attend the 2017 DefCon hacker conference when he was arrested.

He later pleaded not guilty to the charges in a federal court in Milwaukee, where some of his criminal activity is alleged to have occurred. Hutchins is currently out on bail but has not been permitted to return to his home in England.

'Upas'

In a superseding indictment filed this week, prosecutors are now accusing Hutchins of also authoring and distributing the Upas Kit malware that uses a form grabber and Web injects for stealing credentials and other data from infected systems.

Three of the four new charges in the superseding indictment are related to Hutchins' alleged role in advertising and distributing the malware in collaboration with "Vinny," an alleged co-conspirator. Prosecutors allege that Hutchins developed Upas Kit and provided it to Vinny, who sold it for $1,500 to an individual in Milwaukee. Vinny is alleged to have helped Hutchins distribute Kronos as well.

The indictment describes the alleged criminal activity involving Upas Kit as starting sometime on or before July 2012, when Hutchins would likely still have been a minor.

The fourth new charge in the superseding indictment this week accuses Hutchins of knowingly lying to federal prosecutors about his role in developing Kronos.

Hutchins, who before the WannaCry incident referred to himself simply as "Malwaretech" and ran a blog under that name, now faces a total of ten counts related to his alleged malware activity. He could spend years in US jail if convicted on all charges.

In a tweet, Hutchins expressed his frustration at the development. "Spend months and $100k+ fighting this case, then they go and reset the clock by adding even more bullshit charges like 'lying to the FBI'," he said while making an appeal for more donations for funding his defense.

Some others, who see Hutchins as being the victim of overzealous prosecutors, too, voiced their disappointment. They maintain that Hutchins' alleged criminal activity, while not condonable, is typical of many security researchers who dabble in dubious activity when they're young, but eventually straighten out.

"A lot of security people have flecks of dirt accumulated over the years," says Nicholas Weaver, senior researcher networking and security at the University of California, Berkley's International Computer Science Institute.

But it is important to "keep open exchanges even with people whose hats aren’t as quite lily-white as we’d like," he says.

Hutchins' arrest when visiting the US for a security conference could spook other international researchers, he notes. "Yes, Mr Hutchins' hat appears a little gray, based on filings from both sides in the court case," and open source investigations, Weaver says. "But I don't think it is gray enough to justify damaging the important free-flow of people and information we get at major security conferences."

Some legal experts have also questioned the strength of the government's case against Hutchins, and of its interpretation of certain statutes in prosecuting him.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Adelaida
50%
50%
Adelaida,
User Rank: Apprentice
6/13/2018 | 5:02:33 AM
wow
Let no good deed go unpunished...
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11515
PUBLISHED: 2019-04-25
core/classes/db_backup.php in Gila CMS 1.10.1 allows admin/db_backup?download= absolute path traversal to read arbitrary files.
CVE-2019-11511
PUBLISHED: 2019-04-25
Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
CVE-2019-11513
PUBLISHED: 2019-04-25
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
CVE-2019-11514
PUBLISHED: 2019-04-25
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
CVE-2019-11506
PUBLISHED: 2019-04-24
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to Expo...