Everipedia Logo
Everipedia is now IQ.wiki - Join the IQ Brainlist and our Discord for early access to editing on the new platform and to participate in the beta testing.
Marcus Hutchins

Marcus Hutchins

Marcus Hitchens, also know by his pseudonym, Malware Tech, is a hacker in England known for stopping an international cyber ransom hack attack. [2] [3]

Personal Life and Interests

ESXi server and Necurs.

ESXi server and Necurs.

Though his name has not been revealed to the world as of yet, he has given insight about his life on is Twitter handle. [6]He was born in June 1994 in the United Kingdom to English and Scottish parents - that is, he is half Scottish. [4]

He currently lives in South-West England in a Victorian House.

He is considered a tech nerd and has amassed a huge collection of video games that he has shared with the world.

He has also shared the kind of servers that he uses, his computers screens and ideas about IT on his Social media profiles. [4]

He likes living close to the ocean and enjoys going out Surfing. [6]

He often attends "Hack conventions" such as the one he attended the previous summer, in Las Vegas, Nevada called Defcon. [6]

Education

Malware Tech's gaming equipment.

Malware Tech's gaming equipment.

Besides having a primary and secondary education, he opted not to attend University and continue his higher education as he was offered a job in security as an IT executive.

[4]

His education in tech and web security and IT is all self-taught.

He now offers his services to a private intel threat firm in Los Angeles, California. [4]His job consists of investigating the latest malicious computer software released by criminals and hackers. [4]

Cyber Ransom

Malware Tech's cell phone getting blasted with messages from Twitter and beyond.

Malware Tech's cell phone getting blasted with messages from Twitter and beyond.

The code he shared of the domain sinkhole.

The code he shared of the domain sinkhole.

May 12th, 2017, a cyber attack known as WannaCrypt attacked IT Managers and major companies around the world.

On the morning of Friday, May 12th, 2017, which was another day off for Malware Tech, he woke up just before the afternoon and checked the UK cyber threat sharing platform and began following the spread of the Emotet banking malware.

When he returned from lunch with a friend, he checked again by now the ransomware was at full swing.

[9]

Look for unregistered or expired C2 domains belonging to active botnets and point it to our sinkhole (a sinkhole is a server designed to capture malicious traffic and prevent control of infected computers by the criminals who infected them).He

discovered that it included an unusual reference to a website address that nobody owned, so he purchased the address for £8.30 and pointed it at a ‘sinkhole’ server in Los Angeles. With

the help of other IT experts, they took to eradicating the malware. He

followed his standard model of taking three steps, which are: [9]

  1. Gather data on the geographical distribution and scale of the infections, including IP addresses, which can be used to notify victims that they’re infected and assist law enforcement.

  2. Reverse engineer the malware and see if there are any vulnerabilities in the code which would allow us to take-over the malware/botnet and prevent the spread or malicious use, via the domain we registered.

Unexpectedly, his registration of the website prevented the spread of the ransomware and prevented it ransoming any new computer.

They triggered the malware by accident and realized what they have done and kept it online in order to kill the rest of the infections.

[9]

He is being regarded as a hero, yet he says that it was done by accident as he was just following his own protocol in IT work which led him to discover and see the answers to stopping the problem which then became obvious in halting immediately.

Malware Tech believes that such hackers have no reason to ever stop as there's a lot of money to be made.

The next hack may not be as easy to stop.

[9]

References

[1]
Citation Linktelegraph.co.ukThe telegraph article Marcus and how he was able to stop the ransomware.
May 16, 2017, 3:27 AM
[2]
Citation Linknydailynews.comAn interview with Marcus Hutchins.
May 16, 2017, 4:07 AM
[3]
Citation Linkfacebook.comThe public Facebookpage of Malware Tech.
May 13, 2017, 11:20 PM
[4]
Citation Linkmalwaretech.comThe main website of Malware Tech.
May 13, 2017, 11:20 PM
[5]
Citation Linkdailymail.co.ukThe Daily Mailof Malware Tech.
May 13, 2017, 11:21 PM
[6]
Citation Linkbbc.comThe BBCwhere they hail Malware Tech as a hero for stopping a cyber attack.
May 13, 2017, 11:22 PM
[7]
Citation Linktwitter.comThe Twitteraccount of Malware Tech.
May 13, 2017, 11:32 PM
[8]
Citation Linkeveripedia-storage.s3.amazonaws.comESXi server and Necurs.
May 13, 2017, 11:35 PM
[9]
Citation Linkeveripedia-storage.s3-accelerate.amazonaws.comPhoto of Malware Tech and a girl.The photo has been circulating around the Internet.
May 13, 2017, 11:49 PM
[10]
Citation Linkmalwaretech.comArticle that he wrote about how to accidentally stop a global cyber attack.
May 14, 2017, 12:07 AM
[11]
Citation Linkeveripedia-storage.s3.amazonaws.comThe code he shared of the domain sinkhole.
May 14, 2017, 12:41 AM
[12]
Citation Linkeveripedia-storage.s3.amazonaws.comA tweet by one of the other IT people attempting to eradicated the Malware.He shares Malware Tech's discovery.
May 14, 2017, 12:42 AM
[13]
Citation Linkeveripedia-storage.s3.amazonaws.comPhoto of what the Cyber Attack looked like.
May 14, 2017, 12:43 AM
[14]
Citation Linkeveripedia-storage.s3.amazonaws.comPhoto of what the cyber attack looked like.
May 14, 2017, 12:43 AM
[15]
Citation Linkeveripedia-storage.s3.amazonaws.comA Tweet by Malware Tech about his discovery in the cyber attack.
May 14, 2017, 12:44 AM
[16]
Citation Linkeveripedia-storage.s3.amazonaws.comMalware Tech's tweet where he claims that stopping the attack was an accident.
May 14, 2017, 12:45 AM
[17]
Citation Linkeveripedia-storage.s3.amazonaws.comMalware Tech's tweet of the cyber attack and the files that he was handling.
May 14, 2017, 12:46 AM
[18]
Citation Linkeveripedia-storage.s3.amazonaws.comOne of his tweets where he shares his observation of the U.S. having a bad case of Ramnits.
May 14, 2017, 12:47 AM
[19]
Citation Linkeveripedia-storage.s3.amazonaws.comA tweet where he shares how to keep a banking safe from Malware.
May 14, 2017, 12:48 AM
[20]
Citation Linkeveripedia-storage.s3.amazonaws.comThe cat that Malware Tech uses as his profile pic.
May 14, 2017, 12:49 AM