Attacks/Breaches

8/14/2017
12:40 PM
50%
50%

WannaCry Hero Hutchins Pleads Not Guilty

Lawyers for MalwareTech 'confident he will be fully vindicated.'

The man credited with saving the day in the global WannaCry ransomware outbreak today pleaded not guilty to charges of developing and distributing the Kronos banking Trojan.

Marcus Hutchins, 23, aka MalwareTech, was arrested earlier this month in Las Vegas after the Black Hat USA and DEF CON security conferences held there. The UK-based security researcher went before a federal judge today in Milwaukee, Wisc., to enter his plea to the charges. Hutchins has been out on bail since Aug. 5 after friends posted his $30,000 bail.

His attorneys, Marcia Hoffman, formerly with the Electronic Frontier Foundation, and Brian Kleine of Baker Marquart, told reporters after the hearing that Hutchins would now be allowed to return to work.

"He is going to vigorously defend himself against these charges, and when the evidence comes to light, we are confident that he will be fully vindicated," Hoffman told reporters outside the courthouse.

Hutchins will reside in Los Angeles, and must stay in the US under GPS monitoring, and is restricted from accessing the WannaCry sinkhole that he created. Hutchins' trial is scheduled for October.

Read more about the hearing today from the BBC and the EmptyWheel blog

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounde...