LAS VEGAS (AP) — Marcus Hutchins, a young British researcher credited with derailing a global cyberattack in May, was arrested for allegedly creating and distributing malicious software designed to collect bank-account passwords, U.S. authorities said Thursday.
Hutchins was detained in Las Vegas on his way back to Britain from an annual gathering of hackers and information security gurus. A grand jury indictment charged Hutchins with creating and distributing malware known as the Kronos banking Trojan.
Such malware infects web browsers, then captures usernames and passwords when an unsuspecting user visits a bank or other trusted location.
The indictment, filed in a Wisconsin federal court last month, alleges that Hutchins and another defendant — whose name is redacted — conspired between July 2014 and July 2015 to advertise the availability of the Kronos malware on internet forums, sell the malware and profit from it. The indictment also accuses Hutchins of creating the malware.
Authorities said the malware was first made available in early 2014, and “marketed and distributed through AlphaBay, a hidden service on the Tor network.” The U.S. Department of Justice announced in July that the AlphaBay “darknet” marketplace was shut down after an international law enforcement effort.
A court hearing was scheduled for Hutchins on Thursday afternoon in Las Vegas. It was not immediately clear if he has a lawyer.
The Electronic Frontier Foundation, a San Francisco-based digital rights group, said it was “deeply concerned” about Hutchins’ arrest and was attempting to reach him.
Hutchins recently attended Def Con, an annual cybersecurity conference in Las Vegas that ended Sunday. On Wednesday, Hutchins made some routinecomments on Twitter that suggested he was at an airport getting ready to board a plane for a flight home. He never left Nevada.
Andrew Mabbitt, a British digital security specialist who had been staying in Las Vegas with Hutchins, said he and his friends grew worried when they got “radio silence” from Hutchins for hours. The worries deepened when Hutchins’ mother called to tell him the young researcher hadn’t made his flight home.
Mabbitt said he eventually found Hutchins’ name on a detention center website. News of his indictment Wednesday left colleagues scrambling to understand what happened.
“We don’t know the evidence the FBI has against him, however we do have some circumstantial evidence that he was involved in that community at the time,” said computer security expert Rob Graham.
The big question is the identity of the co-defendant in the case, whose name is redacted in the indictment. Why was it blacked out?
“Maybe the other guy testified against him,” said Graham. The co-defendant allegedly advertised the malware online. Hutchins is accused of creating and transmitting the program.
The problem with software creation is that often a program includes code written by multiple programmers. Prosecutors might need to prove that Hutchins wrote code with specific targets.
“I’ve written code that other people have injected malware into,” said Graham. “We know that large parts of Kronos were written by other people.”
One legal scholar who specializes in studying computer crime said it’s unusual, and problematic, for prosecutors to go after someone simply for writing or selling malware — as opposed to using it to further a crime.
“This is the first case I know of where the government is prosecuting someone for creating or selling malware but not actually using it,” said Orin Kerr, a law professor at George Washington University. Kerr said it will be difficult to prove criminal intent.
“It’s a constant issue in criminal law — the helping of people who are committing a crime,” Kerr said. “When is that itself a crime?”
Matt O’Brien reported from Providence, Rhode Island. Associated Press writers Raphael Satter in Paris and Frank Bajak in Houston contributed to this report.