Developer Sentenced for Network Sabotage - 'Kill Switch' Attack

Former Employee Sentenced for Network Sabotage
A previous software engineer has received a four-year prison sentence for intentionally disrupting the network of his previous workplace following his departure.
Davis Lu, aged 55, was found guilty of implementing a destructive “kill switch” within his former employer’s network. This involved embedding malicious code specifically designed to cause server failures should his employment be terminated.
Activation of the Kill Switch
The embedded kill switch was triggered when the company ended Lu’s employment and revoked his access credentials. The switch, named “IsDLEnabledinAD” – a reference to the active status of Lu’s account within the company’s Active Directory – was activated at this point.
Consequently, thousands of employees were prevented from accessing the company’s critical systems.
Financial Impact and Investigation
The Justice Department, responsible for the prosecution, stated that Lu’s actions resulted in damages amounting to hundreds of thousands of dollars. The affected company, reportedly the power technology firm Eaton, was not officially named in court documents.
Lu’s identification was aided by an examination of his internet search history. Investigators discovered searches related to techniques for privilege escalation, concealing processes, and performing rapid file deletion.
TechCrunch Survey
TechCrunch is committed to continuous improvement. Your feedback is valuable! Please complete this survey to share your thoughts on our coverage and events, and you’ll be entered for a chance to win a prize.
Important Keywords: network sabotage, kill switch, malicious code, data breach.
Related Posts

NHS England Data Breach Confirmed by Tech Provider

Cisco Zero-Day Exploit: Chinese Hackers Targeting Customers

Pornhub Hacked: User Data Extorted by Hacking Group

Google and Apple Release Emergency Security Updates

700credit Data Breach: 5.6 Million Affected
