MarketMarcus Hutchins
Company Profile

Marcus Hutchins

Marcus Hutchins, also known online as MalwareTech, is a British computer security researcher known for stopping the WannaCry ransomware attack. He is employed by cybersecurity firm Kryptos Logic.

Early life
Hutchins is the elder son of Janet Hutchins, a Scottish nurse, and Desmond Hutchins, a Jamaican social worker. Around 2003, when Hutchins was nine years old, the parents moved the family from urban Bracknell, near London, to rural Devon. He had shown early aptitude with computers and learned simple hacking skills early on such as bypassing security on school computers to install video game software. In addition, he spent time learning to be a surf lifeguard. He became involved with an online forum that promoted malware development, more as a means to show off their skills to each other rather than for nefarious purposes. When he was about 14 years old, he created his own contribution, a password stealer based on Internet Explorer's AutoFill feature, which was met with approval by the forum. He spent much of his time with this community to the extent his school work began to fail. When the school's systems were compromised, the school authorities claimed Hutchins was the culprit. Though he denied any involvement, school authorities permanently suspended him from using the computers at school, which further pushed Hutchins to skip school more often and spend more time in the malware forums. ==Career==
Career
UPAS Kit and Kronos At around this time, the original malware forums had been closed, and Hutchins transferred to another hacker community, HackForums. In this new forum, members were expected to show more skill by demonstrating possession of a botnet. Hutchins, 15 years old at the time, successfully created an 8,000-computer botnet for HackForums by tricking BitTorrent users into running his fake files to take control of their machines. as Hutchins had been able to plead to the hacker behind it, once he had tracked him down, with his own experiences to convince him to stop the botnet. Hutchins had become aware of WannaCry the afternoon of 12 May, and though he had been on vacation, he began reverse engineering the code from his bedroom. He discovered that the malware was tied to an odd-looking domain name, suggesting the malware would be part of a command-and-control structure common to botnets, but to his surprise, the domain name was not registered. He quickly registered the domain and set up servers at Kryptos Logic within it to act as honeypots, allowing them to track the infected computers. While the WannaCry worm continued to spread over the next few hours, security researchers found that because Hutchins had registered the domain name when he did, WannaCry would not execute further; the domain was effectively the worm's killswitch. Hutchins and Kryptos, along with the UK's National Cyber Security Centre, spent the next several days maintaining the honeypot servers from additional DDoS attacks, some restarted by ongoing Mirai botnets as to make sure the killswitch remained active while Microsoft and other security workers rushed to patch the exploit in the Server Message Block and issue it to end users. A separate effort from French cybersecurity researchers found a method to unlock and decrypt affected computers without having to pay the ransom. Hutchins' work, as MalwareTech, to stop WannaCry, was highly praised, but this led to the press identifying Hutchins as the person behind MalwareTech in the days that followed. Hutchins tried to avoid the press including the more invasive tabloids who had published his name and address tied to the MalwareTech name, though did agree to a single Associated Press interview under his real name, trying to defuse the "hero" perception he had been given. In this coverage, he kept his past history quiet, simply stating that he got his job with Kryptos Logic based on his software skills and MalwareTech blog hobbies he developed during school. He gained a type of a celebrity status within the cybersecurity world for his actions against WannaCry, and plans were made for him to attend the 2017 DEF CON cybersecurity conference in Las Vegas that August. ==Arrest==
Arrest
On 3 August 2017, Hutchins was arrested by the FBI as he was preparing to return to England from DEF CON on six hacking-related federal charges in the U.S. District Court for the Eastern District of Wisconsin for creating and spreading Kronos in 2014 and 2015. Based on documents obtained by Vice through Freedom of Information Act requests, the FBI had tied Hutchins to Kronos after they had seized the assets of AlphaBay in July 2017, where they found evidence of at least one sale of Kronos. The FBI had obtained copies of his conversations with Randy from another dark web server seizure prior to AlphaBay to prove his connection to the software, Hutchins had intended his "not guilty" to be used as part of a plea bargain with the FBI, rather than to deny any involvement with Kronos, though some in the hacker community took this as his denial, and vocally fought for Hutchins' release on this claim. On 19 April 2019 Hutchins pleaded guilty to two of the ten charges, conspiring to commit wire fraud, as well as distributing, selling, promoting, and advertising a device used to intercept electronic communications. His statement included the quote "I regret these actions and accept full responsibility for my mistakes. Having grown up, I’ve since been using the same skills that I misused several years ago for constructive purposes." Hutchins faced up to five years in prison and $250,000 in fines for the two charges. On 26 July 2019, Judge Joseph Peter Stadtmueller sentenced Hutchins to time served and one year of supervised release, recognizing that Hutchins had "turned the corner" from using his skills for criminal purpose into beneficial uses well before he had faced justice. According to a 2020 Wired profile, Hutchins stated that while he preferred to stay in Los Angeles, he expected following the year of supervised release he would be deported back to the United Kingdom, as he had long overstayed his travel visa. ==Notes==
tickerdossier.comtickerdossier.substack.com