• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Chinese Developer Jailed for Deploying Malicious Code at US Company

Jane Doe by Jane Doe
August 26, 2025
in Cyber
Share on FacebookShare on Twitter

A Chinese national was sentenced to four years in a U.S. federal prison for intentionally damaging his former employer’s computer network with malicious code. Davis Lu, a 55-year-old software developer, was convicted in March for a scheme that caused hundreds of thousands of dollars in losses for Eaton Corporation, a global power management company based in Beachwood, Ohio.

According to court documents and evidence presented during the trial, Lu, who had been an employee since 2007, began sabotaging the company’s systems in 2018 after a corporate reorganization reduced his responsibilities. By August 2019, he had deployed a series of malicious codes designed to disrupt operations. These included “infinite loops” that caused servers to crash by overwhelming their resources, as well as code that randomly deleted co-worker profiles.

The most damaging piece of malware was a “kill switch” Lu had programmed to activate if his account was disabled from the company’s network. He audaciously named the code “IsDLEnabledinAD,” an abbreviation for “Is Davis Lu enabled in Active Directory.” When he was terminated on September 9, 2019, the kill switch was triggered, locking out thousands of employees worldwide and crippling company systems.

Read

PAGERDUTY Confirms Data Breach After Salesforce Account Compromise

Thailand’s PDPA Crackdown 2025: Major Fines and Lessons from Latest Enforcement

The Department of Justice released a statement from Acting Assistant Attorney General Matthew R. Galeotti, who said, “The defendant breached his employer’s trust by using his access and technical knowledge to sabotage company networks, wreaking havoc and causing hundreds of thousands of dollars in losses for a U.S. company.”

In addition to the extensive damage, Lu also attempted to cover his tracks. On the day he was asked to return his company laptop, he deleted encrypted data and ran a command to make the information unrecoverable by forensic software. However, investigators were able to recover his internet search history, which showed he had researched methods to escalate privileges and rapidly delete files, demonstrating a clear intent to obstruct efforts to resolve the disruptions. The FBI noted that the case highlights the importance of identifying and mitigating insider threats. Following his four-year sentence, Lu will serve three years of supervised release.

Previous Post

Pakistani Hackers Back at Targeting Indian Government Entities

Next Post

Aviation sector faces heightened cyber risks due to vulnerable software, aging tech

Jane Doe

Jane Doe

More Articles

UN Creates Two Mechanisms for Global Governance of AI
Cyber

French Retail Giant Auchan Discloses Cyberattack on Loyalty Accounts

French retail giant Auchan has confirmed that a cyberattack compromised the personal data of several hundred thousand customers, with the...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Hackers Breach Fintech Firm in Attempted $130M Bank Heist

A major Brazilian fintech company, Sinqia S.A., has revealed that it was the target of a sophisticated cyberattack on August...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

A Decade of Strengthening Singapore’s Cyber Defence Amid Escalating Threats

Over the last ten years, Singapore has systematically built a formidable cyber defence framework, positioning itself as a global leader...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Pentera Announces Automated Security Validation for Cl0p – Most Active Ransomware Group in 2025

Cybersecurity company Pentera has unveiled a new automated security validation module designed to test and fortify defenses against the Cl0p...

by Jane Doe
September 3, 2025
Next Post
IBM and AMD Join Forces to Build the Future of Computing

Aviation sector faces heightened cyber risks due to vulnerable software, aging tech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.