• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

WannaCry hero back on Twitter after pleading not guilting over Kronos

August 15th, 2017 Waqas Cyber Crime, Malware, Security 0 comments
WannaCry hero back on Twitter after pleading not guilting over Kronos
Share on FacebookShare on Twitter

He is not allowed to access the “Kill Switch” he created to stop WannaCry ransomware from spreading.

23-year-old Marcus Hutchins known for protecting thousands of users and business from WannaCry ransomware infection has pleaded not guilty over the accusation blaming him for his role in developing and distributing Kronos banking malware between 2014 and 2015 that targeted users around the world including the United States.

Those who are not familiar with the issue, Hutchins was visiting the States to attend the BlackHat and DefCon hacking conference in Las Vegas. On the day of his departure back to London, the Federal Bureau of Investigation (FBI) arrested him and accused him of developing the Kronos malware. 

However, Hutchins’s attorney Adrian Lobo rubbished all charges and told media that her client had got the bail for $30,000 on conditions that he will not access the Internet, he will not leave the country and must use a GPS monitor. Lobo also stated that Hutchins would plead not guilty.

[fullsquaread][/fullsquaread]

If found guilty, Hutchins can face a 40-year prison sentence. However, on Monday, Hutchins appeared at a federal court in Wisconsin where not only did he not plead guilty but also argued why he should be allowed to use the Internet. 

Apparently, Hutchins’s arguments were strong enough for the judge who allowed him to use the Internet on one condition that he will not access the “kill switch” for WannaCry ransomware which halted the infection from spreading. Remember, the kill switch is a domain which Hutchins accidentally bought after analyzing WannaCry’s patron.

i'm still on trial, still not allowed to go home, still on house arrest; but now i am allowed online. Will get my computers back soon.

— MalwareTech (@MalwareTechBlog) August 14, 2017

Hutchins can not access the kill switch since the FBI has seized it. However, the reason for seizing the domain is still not known since it has nothing to do with Kronos malware or its distribution. But the good news is that he can now travel anywhere within the United States as far as he is wearing the GPS monitor.

Also, Brian Klein and Marcia Hofmann will be representing Hutchins for the rest of the case. Hoffman represents the privacy advocate group  Electronic Frontier Foundation (EFF). In a talk to media outside the US court, Hoffman said that “Marcus Hutchins is a brilliant young man and hero – He is going to vigorously defend himself against these charges, and when the evidence comes to light we are confident he will be fully vindicated.”

  • Tags
  • Cyber Crime
  • DefCon
  • FBI
  • internet
  • Malware
  • Ransomware
  • security
  • Technology
  • TROJAN
  • WannaCry
Facebook Twitter LinkedIn Pinterest
Previous article OLE flaw lets malware infected PowerPoint files evade antivirus detection
Next article Blizzard Entertainment hit by massive DDoS attack
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

59
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

93
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

111

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us