Chinese Hacker Sentenced for Using Kill Switch on Ohio Company’s Global Network

add a heading

A 55-year-old Chinese national, Davis Lu, has been sentenced to four years in federal prison for executing a destructive insider cyberattack on the global IT infrastructure of his former employer in Beachwood, Ohio.

Lu exploited his privileged role as a software developer to implant advanced malware that disrupted thousands of users across multiple countries. The case demonstrates how dangerous insider threats can be when combined with technical expertise and unrestricted system access.

Key Highlights

  1. Sentencing: Lu received 48 months imprisonment for planting destructive scripts, loops, and a company-wide kill switch.
  2. Malware Arsenal: His tools, known as “Hakai” (Japanese for “destruction”) and “HunShui” (Chinese for “lethargy”), combined data-wiping and anti-recovery mechanisms.
  3. Security Lessons: The incident underlines the critical need for zero-trust policies and tight privileged access controls.

Inside the Kill Switch Attack

From 2007 to 2019, Lu worked inside the company, gaining deep knowledge of its systems. He then weaponized this knowledge by planting code designed to:

  • Launch infinite loops that overloaded servers until they crashed, simulating a denial-of-service from within the network.
  • Erase user profiles in Active Directory, disabling authentication and locking out legitimate employees.
  • Deploy a kill switch, “IsDLEnabledinAD”, which checked if Lu’s own account was active. Once his account was terminated, the kill switch triggered mass lockouts worldwide.

The design mirrored dead man’s switch logic, ensuring his dismissal would automatically unleash maximum disruption.

Advanced Insider Tactics

Lu carefully prepared anti-forensic techniques to cover his tracks:

  • Encrypted deletion commands to block digital forensics.
  • Scripts preventing recovery of wiped data.
  • Research into privilege escalation, process hiding, and secure file deletion.

The final detonation occurred on September 9, 2019, when Lu’s access was disabled, causing an instant global outage that impacted thousands of employees.

Broader Implications

The case reveals how privileged access mismanagement creates major risks. Organizations are urged to adopt:

  • Privileged Access Management (PAM) solutions.
  • Zero-Trust Architecture to minimize insider threats.
  • Regular insider threat detection programs.

Federal prosecutors highlighted this case as part of ongoing efforts by the Computer Crime and Intellectual Property Section (CCIPS), which has achieved over 180 cybercrime convictions since 2020 and recovered more than $350 million for victims.

Indicators of Compromise (IOCs)

IOC TypeDetailsNotes
Malware NamesHakai, HunShuiCustom destructive malware with symbolic naming
Kill SwitchIsDLEnabledinADRecursive Active Directory kill switch check
Attack MethodsInfinite loops, AD profile deletionDoS-like effects inside enterprise systems
Forensic EvasionEncrypted deletion, process hidingDesigned to block recovery and IR investigation