Developer jailed for taking down employer's network with kill switch malware - DataBreaches.Net
Briefly

Davis Lu, 55, worked at Eaton for twelve years and became a senior developer of emerging technology before a company restructuring led to his demotion. In response he installed a 'kill switch' on company servers that would activate if his network access was revoked. The payload was a Java program that created increasing numbers of non-terminating threads in an infinite loop to consume resources and crash servers. Lu named the malware IsDLEnabledinAD, short for 'Is Davis Lu enabled in Active Directory.' He uploaded the software with his corporate credentials. A US court sentenced him to four years' imprisonment.
A US court sentenced a former developer at power management biz Eaton to four years in prison after he installed malware on the company's servers. Davis Lu, 55, spent a dozen years at Eaton and rose to become a senior developer of emerging technology, before the company demoted him after restructuring. Lu unwisely responded to that setback by installing a "kill switch" that would activate if the company revoked his network access.
The package was a Java program that generated increasing numbers of non-terminating threads in an infinite loop that would eventually use enough resources to crash the server. ... Lu labeled his malware IsDLEnabledinAD, for "Is Davis Lu enabled in Active Directory." Furthermore, after developing the software he uploaded it using his corporate credentials - hardly clean OPSEC, to quote the US Defense Secretary.
Read at DataBreaches.Net
[
|
]