Generated by DeepSeek V3.2| Marcus Hutchins | |
|---|---|
| Name | Marcus Hutchins |
| Birth place | Ilfracombe, Devon, England |
| Known for | Discovering the WannaCry ransomware kill switch; malware research |
| Occupation | Cybersecurity researcher |
| Nationality | British |
Marcus Hutchins. A British cybersecurity researcher who gained international recognition for his role in halting the global WannaCry ransomware attack in 2017. His subsequent arrest by the FBI on unrelated malware charges and his later advocacy for ethical hacking have made him a prominent and controversial figure in the information security community. Hutchins' career highlights the complex intersection of white-hat research, legal boundaries, and public perception within cybersecurity.
Born and raised in the coastal town of Ilfracombe in Devon, he developed an early interest in computers and programming. He attended local schools before pursuing his education in computer science and information technology. His technical skills were largely self-taught through online communities and practical experimentation, a common pathway for many in the cybersecurity field. This foundational period was spent in England before his work drew significant international attention.
In May 2017, the WannaCry ransomware attack, which leveraged exploits allegedly stolen from the NSA, began crippling hundreds of thousands of computers worldwide, including systems within the UK's National Health Service. While analyzing the malware's code from his home in Ilfracombe, he discovered a hardcoded, unregistered domain name that functioned as a "kill switch." By registering the domain, MalwareTech—his online alias—effectively halted the ransomware's propagation, dramatically slowing the global cyberattack. His actions were widely praised by law enforcement agencies like the National Crime Agency and cybersecurity firms such as Kaspersky Lab.
In August 2017, while attending the DEF CON cybersecurity conference in Las Vegas, he was arrested by the FBI at McCarran International Airport. A grand jury in the Eastern District of Wisconsin had indicted him on charges related to creating and distributing the Kronos banking trojan between 2012 and 2015. After initially pleading not guilty, he changed his plea to guilty in 2019 to two charges of creating malware, while maintaining his actions were unrelated to the WannaCry incident. The case was prosecuted by the United States Department of Justice.
Following his guilty plea, he received a sentence of time served and one year of supervised release, allowing him to return to the United Kingdom. He has since worked as a security researcher and consultant, often speaking at events like DEF CON and Black Hat Briefings about malware analysis and ethical hacking. He has been an advocate for reforming laws like the Computer Fraud and Abuse Act and for clearer legal protections for security researchers. His case is frequently cited in discussions about the gray hat hacker community and the legal risks of early-career security work.
For his role in countering the WannaCry attack, he received widespread acclaim, including a "Pwnie Award" for Best Killshot at the Pwnie Awards in 2017. Various media outlets, including The Guardian and Wired, have profiled his story. Within the cybersecurity industry, his actions are often highlighted as a prime example of positive intervention by the independent research community against a major global cyber threat. His journey from a hailed hero to a defendant and back to an advocate has made him a unique and recognized personality in the field.
Category:British computer security experts Category:British hackers Category:Malware researchers