Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Posted on August 22, 2025August 22, 2025 By CWS

Aug 22, 2025Ravie LakshmananCybercrime / Malware
A 55-year-old Chinese language nationwide has been sentenced to 4 years in jail and three years of supervised launch for sabotaging his former employer’s community with customized malware and deploying a kill swap that locked out workers when his account was disabled.
Davis Lu, 55, of Houston, Texas, was convicted of inflicting intentional injury to protected computer systems in March 2025. He was arrested and charged in April 2021 for abusing his place as a software program developer to execute malicious code on his employer’s laptop servers.
“The defendant breached his employer’s belief by utilizing his entry and technical data to sabotage firm networks, wreaking havoc and inflicting a whole lot of hundreds of {dollars} in losses for a U.S. firm,” mentioned Appearing Assistant Lawyer Common Matthew R. Galeotti of the Justice Division’s Legal Division.
“Nonetheless, the defendant’s technical savvy and subterfuge didn’t save him from the results of his actions.”
Court docket paperwork present that Lu was employed as a software program developer for the unnamed firm primarily based in Ohio from November 2007 to October 2019. However after his duties and system entry have been lowered following a 2018 company realignment, Lu enacted a scheme to intentionally introduce malicious code round August 2019, leading to system crashes and stopping consumer logins.

To drag this off, Lu is claimed to have created infinite loops in supply code to set off server crashes by repeatedly creating new Java threads with out correct termination. He additionally deleted coworker profile recordsdata and applied a kill swap that will lock out all customers if his credentials within the firm’s Lively Listing have been disabled.
“The ‘kill swap’ code – which Lu named ‘IsDLEnabledinAD,’ abbreviating ‘Is Davis Lu enabled in Lively Listing’ — was routinely activated when he was positioned on depart and requested to give up his laptop computer on September 9, 2019, and impacted hundreds of firm customers globally,” the Division of Justice mentioned.
“Lu named different code ‘Hakai,’ a Japanese phrase that means ‘destruction,’ and ‘HunShui,’ a Chinese language phrase that means ‘sleep’ or ‘lethargy.'”
Moreover, on the day Lu was instructed to return his company-issued laptop computer, the defendant deleted encrypted volumes and tried to erase Linux directories and two further tasks. His web search historical past laid naked the strategies he researched to escalate privileges, disguise processes, and delete recordsdata, suggesting an try and hinder the corporate’s efforts to resolve the problems.
Lu’s illegal actions are estimated to have value the corporate a whole lot of hundreds of {dollars} in losses, per the division. This case additionally underscores the significance of figuring out insider threats early, added Assistant Director Brett Leatherman of the Federal Bureau of Investigation’s (FBI) Cyber Division.

The Hacker News Tags:Employer, ExDeveloper, Jailed, KillSwitch, Malware, Ohio, Sabotaging, Years

Post navigation

Previous Post: ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
Next Post: AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes

Related Posts

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 The Hacker News
Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News
New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code The Hacker News
Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News
Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News