1. To visit protected / private sections of the forum you must be connected with your user account. If you are not yet a member of our forum, you can create it now for free!.

User Tag List

Thread: Marcus “MalwareTech” Hutchins Pleads Guilty to Writing, Selling Banking Malware

Results 1 to 5 of 5

  1. #1
    Junior Member
    Join Date Apr 2016
    Posts 5
    Like (Stats)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quoted
    1 Post(s)

    Post Marcus “MalwareTech” Hutchins Pleads Guilty to Writing, Selling Banking Malware

    Marcus Hutchins, a 24-year-old blogger and malware researcher arrested in 2017 for allegedly authoring and selling malware designed to steal online banking credentials, has pleaded guilty to criminal charges of conspiracy and to making, selling or advertising illegal wiretapping devices.

    Marcus Hutchins, a 24-year-old blogger and malware researcher arrested in 2017 for allegedly authoring and selling malware designed to steal online banking credentials, has pleaded guilty to criminal charges of conspiracy and to making, selling or advertising illegal wiretapping devices.

    Marcus Hutchins, just after he was revealed as the security expert who stopped the WannaCry worm. Image: twitter.com/malwaretechblog

    Hutchins, who authors the popular blog MalwareTech, was virtually unknown to most in the security community until May 2017 when the U.K. media revealed him as the “accidental hero” who inadvertently halted the global spread of WannaCry, a ransomware contagion that had taken the world by storm just days before.

    In August 2017, Hutchins was arrested by FBI agents in Las Vegas on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. A British citizen, Hutchins has been barred from leaving the United States since his arrest.

    Many of Hutchins’ supporters and readers had trouble believing the charges against him, and in response KrebsOnSecurity published a lengthy investigation into activities tied to his various online personas over the years.

    As I wrote in summary of that story, the clues suggested “Hutchins began developing and selling malware in his mid-teens — only to later develop a change of heart and earnestly endeavor to leave that part of his life squarely in the rearview mirror.” Nevertheless, there were a number of indications that Hutchins’ alleged malware activity continued into his adulthood.

    In a statement posted to his Twitter feed and to malwaretech.com, Hutchins said today he had pleaded guilty to two charges related to writing malware in the years prior to his career in security.

    “I regret these actions and accept full responsibility for my mistakes,” Hutchins wrote. “Having grown up, I’ve since been using the same skills that I misused several years ago for constructive purposes. I will continue to devote my time to keeping people safe from malware attacks.”

    Hutchins pleaded guilty to two of the 10 counts for which he was originally accused, including conspiracy charges and violating U.S.C. Title 18, Section 2512, which involves the manufacture, distribution, possession and advertising of devices for intercepting online communications.

    Creating malware is a form of protected speech in the United States, but selling it and disseminating it is another matter. University of Southern California law professor Orin Kerr‘s 2017 dissection of the government’s charges is worth a read for a deep dive on this sticky legal issue.

    According to a copy of Hutchins’ plea agreement, both charges each carry a maximum of up to five years in prison, up to a $250,000 fine, and up to one year of supervised release. However, those charges are likely to be substantially tempered by federal sentencing guidelines, and may take into account time already served in detention. It remains unclear when he will be sentenced.

    The plea agreement is here (PDF). “Attachment A” beginning on page 15 outlines the government’s case against Hutchins and an alleged co-conspirator. The government says between July 2012 and Sept. 2015, Hutchins helped create and sell Kronos and a related piece of malware called UPAS Kit.

    Despite what many readers here have alleged, I hold no ill will against Hutchins. He and I spoke briefly in a friendly exchange after a chance encounter at last year’s DEF CON security conference in Las Vegas, and I said at the time I was rooting for him to beat the charges. I sincerely hope he is able to keep his nose clean and put this incident behind him soon.
    Source: _https://krebsonsecurity.com/2019/04/marcus-malwaretech-hutchins-pleads-guilty-to-writing-selling-banking-malware/

    Did he really author Kronos, does anybody have info on that?
  2. #2
    sagitari0's Avatar
    Junior Member
    Join Date Dec 2017
    Posts 23
    Like (Stats)
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Quoted
    2 Post(s)
    We need to understand how the police gotten MalwareTech.
    I'm very careful with my IP... I ONLY access here (and other forums) over Tor, all my HDs are encrypted, I use crypted messengers (Telegram and WickrMe, but we dont know how much is it secure!)

    When I upload some code, its over Tor.

    I never say "good morning" "good afternoon" or "good night" in foruns, its could be used to trace your GMT...

    If Malwaretech is a good hacker, why and how him fails? We need to learn with this.
    sorry for my english, its not my native language

    padwan in malware, padwan in hacking, jedi to find bugs in my life.

    WickrMe : sagitari0
  3. Likes VOLKOV liked this post
  4. #3
    Junior Member
    Join Date Mar 2012
    Posts 8
    Like (Stats)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quoted
    1 Post(s)
    it's not hard, he was running irc.voidptr and was open about malwaredev, then one day he decided to turn white and change his handle and turn irc.voidptr into irc.malwaretech... His OPSEC was pure crap. Everyone knew, and there was idle people there for years, prob agents
  5. Likes VOLKOV, RiRye liked this post
  6. #4
    VOLKOV's Avatar
    Moderator
    Join Date Jun 2014
    Location Kanchatka
    Posts 629
    Like (Stats)
    Mentioned
    17 Post(s)
    Tagged
    0 Thread(s)
    Quoted
    46 Post(s)
    We need to understand how the police gotten MalwareTech.
    I'm very careful with my IP... I ONLY access here (and other forums) over Tor, all my HDs are encrypted, I use crypted messengers (Telegram and WickrMe, but we dont know how much is it secure!)

    When I upload some code, its over Tor.

    I never say "good morning" "good afternoon" or "good night" in foruns, its could be used to trace your GMT...

    If Malwaretech is a good hacker, why and how him fails? We need to learn with this.

    He was not a hacker, he was a coder.
    so he created the bank trojan kronos bot, and started selling
    I think he had already left a lot of traces before he created kronos bot and started selling, so fbi already had data about him because of course they used e-mail, social networks etc and found links with the creator of kronos bot Vinnyk, this he got caught
    Remember that coders are not hackers, so do not know about personal security as much as we do, only after creating your malware kronos and that he became a hacker, but could not protect himself,imho.
    Selling/rent private trojan Emotet bot,only serious guys,write me on pm.
  7. Likes sagitari0 liked this post
  8. #5
    Junior Member
    Join Date Mar 2017
    Posts 1
    Like (Stats)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quoted
    0 Post(s)
    He was also asking about the legality's of DDOS's attacks a few years back as well...

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 0
    Last Post: 23-07-2017, 17:13
  2. Replies: 0
    Last Post: 26-03-2017, 22:32
  3. Source code of Tinba banking malware leaked
    By VOLKOV in forum Tutorials and Articles
    Replies: 3
    Last Post: 12-07-2014, 18:36
  4. EMOTET the banking malware which uses network sniffing
    By VOLKOV in forum Tutorials and Articles
    Replies: 0
    Last Post: 28-06-2014, 20:40

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

Tags for this Thread