Attacks/Breaches

8/7/2017
05:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

WannaCry Hero Garners Security Industry Support Following Arrest

US law enforcement arrested British security researcher Marcus Hutchins for allegedly developing and selling the Kronos banking Trojan.

Many within the security community appear to be rallying behind British bug hunter and researcher Marcus Hutchins following his stunning arrest last Thursday for allegedly creating, advertising, and selling the Kronos banking Trojan.

Leading privacy and civil rights group the Electronic Frontier Foundation (EFF) Monday expressed its "deep" concern over the arrest of the man that just this May was widely hailed as a hero for shutting down the WannaCry ransomware pandemic.

"We are looking into the matter and attempting to help Mr. Hutchins obtain good legal counsel," the EFF said in a statement to Dark Reading.

New York City-based cyber law firm Tor Ekeland P.C. along with Symantec cybersecurity czar Tarah Wheeler have established a site for donating to Hutchins' legal defense citing the researcher's right to a fair trial. "We may all have opinions about what Marcus did and didn't do," Wheeler said in comments on the site.

"This is not about guilt or innocence; it is about the belief that all people deserve to be represented under American law with fervor and passion, and that includes security researchers."

The 23-year old Hutchins, who is better known as MalwareTech, has pleaded not guilty to the charges against him and was granted a $30,000 bail Friday. He is scheduled to make an appearance in federal court in Milwaukee on Tuesday. A prosecutor has claimed that Hutchins admitted to creating the banking malware and sold it. If convicted on all charges, Hutchins could spend years in prison.

But the relatively scant information in the indictment papers and the fact that Hutchins is one of two alleged conspirators in the scheme — the other has not yet been identified — have prompted questions about the strength of the government's case against him.

Some, who remember Hutchins' recent role in shutting down WannaCry, appear convinced that the arrest was unmerited and an overreach on the part of federal prosecutors. Others are reserving judgment till more information becomes available.

"As with others in the community, it was a bit of a shock, especially after a Black Hat with positive involvement from high-ranking members of DOJ, " says Jonathan Cran, vice president of research at bug bounty coordination firm BugCrowd.

"We're all trying to determine what this means for Hutchins, as well as what it means for ourselves, and for other researchers in the community. For better or worse, it is already having a chilling effect on research," he says.

Like many others, Cran says the activities that prosecutors have hit Hutchins with — at least based on what's in the indictment papers — were likely not as nefarious as the charges would lead one to believe. For instance, it is entirely possible that Hutchins' alleged act of selling a copy of Kronos and his offer of a "crypting" service to make it more invisible were simply tactics to build and maintain a reputation in underground markets.

In order for the US government to win the case, there needs to be more detail in the form of chat logs, and transactions that show Hutchins' intent when he allegedly hawked and sold the malware, Cran says.

"I think this is a wakeup call that while security research is carefully being welcomed, there are very fine lines for researchers, and it's extremely important to pay attention to the evolving case law. This is not the first case we've seen of this kind and it's not likely to be the last," he says.

Orin Kerr, a professor of law at the George Washington University Law School and a noted expert on cyber matters, is one of those who believes the government will have a hard time proving its case against Hutchins, based on what's known so far about the charges.

In an opinion piece in the Washington Post, Kerr held that based on a first look at the indictment, the government is being overly aggressive in its charges against Hutchins. For example, one of the charges against Hutchins is related to a statute that makes it illegal for anyone to intentionally send out a program or a command that damages a computer. However, in this case, the government's charge appears to be that Hutchins' sale of the software to a third-party is the same as his causing actual damage to a computer.

"For the charge to fit the statute, the government has to prove two things that it may or may not be able to prove," he said. First, prosecutors have to show that Hutchins and his unnamed conspirator had an intention to create damage. Secondly, they need to prove that the agreement between Hutchins and his conspirators was to cause damage to other computers via malware, Kerr said. He pointed to similar legal challenges with all of the other charges against Hutchins.

Ron Austin, an associate professor at Birmingham City University's School of Computing and Digital Technology in the U.K., says the case raises a number of issues between where the cybersecurity community is and where the law is in relation to researching and stopping attacks.  "There is a risk within security research where a researcher may release test code that is later used maliciously," Austin says.

"It’s a difficult balance between informing and the use of that information. The researcher needs to be able to inform the community in a responsible way," he says. "If it becomes an issue where research is stopped or delayed because the researchers are worried that they face a court case, it risks the unethical hackers gaining ground."

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8298
PUBLISHED: 2018-09-24
Multiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.
CVE-2018-14825
PUBLISHED: 2018-09-24
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable...
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.