Software Developer Sentenced for Malicious Kill Switch on Ex-Employer's Windows Network
Summary
Hide ▲
Show ▼
Davis Lu, a 55-year-old former software developer for Eaton Corporation, has been sentenced to four years in prison and three years of supervised release for creating and deploying malicious code that included a kill switch on his ex-employer's Windows network. The sabotage occurred after Lu's termination in 2019, causing significant disruption and financial loss. Lu embedded a malicious Java thread loop designed to overwhelm servers and crash production systems. He also created a kill switch that locked out all users when his account was disabled. The incident resulted in thousands of users being locked out of their systems, causing hundreds of thousands of dollars in losses. Lu also created additional malicious code named 'Hakai' and 'HunShui'. Lu's actions were discovered after investigators found search queries on his laptop related to privilege escalation, process hiding, and file deletion. He was sentenced for breaching his employer's trust and using his technical knowledge to cause significant harm.
Timeline
-
22.08.2025 02:46 2 articles · 1mo ago
Ex-employee's malicious kill switch disrupts ex-employer's systems
Davis Lu, a 55-year-old former software developer for Eaton Corporation, was sentenced to four years in prison and three years of supervised release for creating and deploying malicious code that included a kill switch on his ex-employer's Windows network. The sabotage occurred after Lu's termination in 2019, causing significant disruption and financial loss. Lu embedded a malicious Java thread loop designed to overwhelm servers and crash production systems. He also created a kill switch that locked out all users when his account was disabled. The incident resulted in thousands of users being locked out of their systems, causing hundreds of thousands of dollars in losses. Lu also created additional malicious code named 'Hakai' and 'HunShui'. Lu's actions were discovered after investigators found search queries on his laptop related to privilege escalation, process hiding, and file deletion. He was sentenced for breaching his employer's trust and using his technical knowledge to cause significant harm.
Show sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
Information Snippets
-
Davis Lu, a Chinese national living legally in Houston, worked for Eaton Corporation from 2007 until his termination in 2019.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu embedded malicious code in Eaton's Windows production environment after a demotion in 2018.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
The malicious code included an infinite Java thread loop to overwhelm servers and crash production systems.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu created a kill switch named 'IsDLEnabledinAD' that locked out all users when his account was disabled.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
The kill switch activated on September 9, 2019, locking out thousands of users and causing significant financial loss.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu deleted encrypted data from his laptop upon being instructed to return it.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Investigators found search queries on Lu's laptop related to privilege escalation, process hiding, and file deletion.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu was sentenced to four years in prison for sabotage and causing hundreds of thousands of dollars in losses.
First reported: 22.08.2025 02:462 sources, 2 articlesShow sources
- Dev gets 4 years for creating kill switch on ex-employer's systems — www.bleepingcomputer.com — 22.08.2025 02:46
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Davis Lu was 55 years old at the time of his sentencing.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu was convicted in March 2025 and arrested in April 2021.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu worked for Eaton Corporation from November 2007 to October 2019.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu's responsibilities and system access were reduced following a 2018 corporate realignment.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu created additional malicious code named 'Hakai' and 'HunShui'.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
-
Lu's actions resulted in a three-year supervised release period in addition to his prison sentence.
First reported: 22.08.2025 09:041 source, 1 articleShow sources
- Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware — thehackernews.com — 22.08.2025 09:04
Similar Happenings
RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
The RaccoonO365 phishing network, a financially motivated threat group, was disrupted by Microsoft's Digital Crimes Unit (DCU) and Cloudflare. The operation, executed through a court order in the Southern District of New York, seized 338 domains used by the group since July 2024. The network targeted over 2,300 organizations in 94 countries, including at least 20 U.S. healthcare entities, and stole over 5,000 Microsoft 365 credentials. The RaccoonO365 network operated as a phishing-as-a-service (PhaaS) toolkit, marketed to cybercriminals via a subscription model on a private Telegram channel. The group used legitimate tools like Cloudflare Turnstile and Workers scripts to protect their phishing pages, making detection more challenging. The mastermind behind RaccoonO365 is believed to be Joshua Ogundipe, who received over $100,000 in cryptocurrency payments. The group is also suspected to collaborate with Russian-speaking cybercriminals. Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.