Developer Faces 10 Years in Prison for Installing a Kill Switch at Former Job

kill switch in employer’s network

The Article Tells The Story of:

  • Revenge Gone Wrong – A fired developer planted a hidden kill switch in his former employer’s system, triggering chaos upon his termination.
  • Global Disruption – The attack locked out thousands of employees worldwide, causing massive financial losses for the company.
  • Caught and Convicted – Investigators uncovered encrypted data, deleted files, and internet searches on hacking techniques.
  • Decade Behind Bars? – The developer now faces up to 10 years in prison for his act of digital sabotage.

Developer’s Revenge Plot Leads to Criminal Charges

A former employee of Eaton Corporation, Davis Lu, has been convicted of criminal sabotage after embedding malicious code in his employer’s systems. This code, designed to activate if he were fired, caused significant damage and financial loss. Lu now faces up to 10 years in prison.

The case highlights the risks companies face from disgruntled employees with insider access. Lu’s actions disrupted thousands of users worldwide and cost the company hundreds of thousands of dollars. His conviction serves as a warning about cybersecurity threats from within.

How the Kill Switch Was Installed

Lu joined Eaton Corporation in 2007 as a developer. For over a decade, his job remained stable. However, in 2018, a corporate realignment reduced his responsibilities and system access. Fearing termination, he took drastic measures to protect himself—or seek revenge.

According to the Department of Justice (DoJ), Lu secretly inserted code into Eaton’s system. This malware:

  • Created infinite loops to overload Java threads, leading to system crashes.
  • Deleted coworker profile files.
  • Activated a kill switch if his account was disabled in Active Directory.

The kill switch, named “IsDLEnabledinAD” (short for “Is Davis Lu Enabled in Active Directory”), remained dormant as long as his credentials were active. The moment his account was deactivated, the malware locked out all users and triggered system failures.

The Aftermath of the Attack

On September 9, 2019, Eaton Corporation terminated Lu’s employment. As expected, the kill switch activated, locking thousands of employees out and disrupting global operations.

Reports indicate that the damage caused financial losses exceeding hundreds of thousands of dollars. Lu’s legal defense argued that the impact was minimal, estimating losses below $5,000, but prosecutors disagreed.

Before returning his company-issued laptop, Lu encrypted its data and searched online for ways to escalate system privileges and delete files quickly. Investigators also found evidence that after being fired, he researched methods to prevent coworkers from reversing the damage he caused.

Legal Consequences and Industry Impact

kill switch in employer’s network

Federal prosecutors charged Lu in 2021, leading to a six-day trial. He was found guilty of causing intentional damage to protected computers, a charge that carries a maximum sentence of 10 years in prison. A sentencing date has yet to be determined.

FBI Special Agent Greg Nelsen emphasized the broader impact of Lu’s actions, stating that he used his skills not to innovate, but to harm his employer and disrupt global operations. This case serves as a crucial lesson in cybersecurity, emphasizing the need for stricter access controls and insider threat monitoring.

Companies worldwide must now rethink their security protocols to prevent similar incidents, ensuring disgruntled employees cannot sabotage critical systems.

Stay Updated: Tech News

Leave a Comment

Your email address will not be published. Required fields are marked *