HackerDefense Report: Marcus Hutchins – The WannaCry Hero the FBI Arrested
Marcus Hutchins stopped the WannaCry ransomware attack that crippled hospitals worldwide. Three months later, the FBI arrested him for code he wrote as a teenager. This HackerDefense Report examines the case that forced the security community to confront questions of redemption and justice.

How a 22-year-old security researcher saved the internet from the worst ransomware attack in history—then was arrested by the FBI for code he wrote as a teenager
Executive Summary
In May 2017, Marcus Hutchins—a 22-year-old British security researcher known online as MalwareTech—single-handedly stopped the WannaCry ransomware attack that was crippling hospitals, businesses, and government agencies across 150 countries. He did this from his bedroom in Devon, England, by registering a domain name.
Three months later, the FBI arrested him at Las Vegas airport after DEF CON, charging him with creating banking malware called "Kronos"—code he allegedly wrote when he was a teenager, years before his heroic actions.
His case represents a fundamental question: should we punish people for mistakes made in youth, even after they've demonstrated extraordinary value to society?
The WannaCry Attack: A Global Emergency
What Happened
On May 12, 2017, a ransomware worm called WannaCry began spreading across the globe with unprecedented speed. The malware exploited EternalBlue, an NSA-developed Windows vulnerability that had been leaked by the Shadow Brokers hacking group.
Within hours:
- NHS hospitals across the UK were forced to cancel surgeries and divert ambulances
- FedEx, Telefonica, and Renault shut down operations
- Russian banks and ministries were infected
- Over 200,000 computers in 150 countries were compromised
The attack caused an estimated $4-8 billion in damages globally.
The Kill Switch
While analyzing a WannaCry sample, Hutchins noticed something unusual: the malware tried to connect to a specific unregistered domain name before encrypting files. If the connection succeeded, the malware would stop.
Hutchins registered the domain for $10.69.
The attack stopped.
What he had discovered was a "kill switch"—likely included by the malware authors as a way to control the outbreak or evade sandbox analysis. By activating it, Hutchins prevented WannaCry from spreading further and gave organizations time to patch their systems.
HackerDefense Assessment: A 22-year-old with a $10 domain registration accomplished what no government cybersecurity agency could. He didn't just analyze the threat—he neutralized it in real-time while the attack was still spreading.
From Hero to Defendant
The Arrest
On August 2, 2017, Marcus Hutchins attended DEF CON in Las Vegas—the world's largest hacking conference. He was celebrated as a hero, invited to speak, and praised by security professionals worldwide.
As he tried to board his flight home to the UK, FBI agents arrested him.
The charges had nothing to do with WannaCry. Instead, the FBI alleged that between 2012 and 2015—when Hutchins was between 17 and 20 years old—he had created and sold banking malware called Kronos.
The Charges
The indictment alleged that Hutchins:
- Created the Kronos banking trojan
- Sold it on dark web forums
- Conspired with an unnamed co-defendant to distribute it
He faced up to 10 years in federal prison.
The Legal Battle
Initial Defense
Hutchins initially pleaded not guilty, and his lawyers argued that the evidence was thin and the charges were a case of mistaken identity or misattribution common in cybercrime cases.
The security community rallied around him. Crowdfunding campaigns raised hundreds of thousands of dollars for his legal defense. Former NSA hackers, security executives, and academics wrote letters of support.
The Guilty Plea
In April 2019, Hutchins pleaded guilty to two of the ten charges:
- Creating malware with intent to damage computers
- Conspiracy to distribute malware
In a statement, he wrote: "I regret these actions and accept full responsibility for my mistakes. Having grown up, I've since been using the same skills that I misused several years ago for constructive purposes."
The Sentence
In July 2019, Judge J.P. Stadtmueller sentenced Hutchins to time served and one year of supervised release. No prison time.
The judge acknowledged what prosecutors couldn't ignore: Hutchins had fundamentally changed. His work stopping WannaCry, his contributions to security research, and his transformation from teenage coder to respected professional warranted leniency.
Key Quote from Sentencing: "It's going to take the people in the security community, the ## people, to come up with solutions because the governmenteli is not going to be able to do it."
The Ethical Questions
Youth and Accountability
Hutchins was 17-20 years old when he allegedly wrote Kronos. The security community had to confront uncomfortable questions:
- Should teenage mistakes define a person's life?
- Is redemption possible in the eyes of the law?
- How many current security professionals have similar skeletons?
The reality is that many white-hat researchers have black-hat origins. The skills are identical; only the intent differs. A justice system that permanently punishes youthful mistakes risks driving talented people away from legitimate security work.
The Timing Problem
The FBI arrested Hutchins after he became famous for stopping WannaCry. This raised suspicions:
- Did his fame make him a target?
- Was the timing designed to maximize embarrassment?
- Would he have been prosecuted if he'd remained anonymous?
The optics were terrible: the US government appeared to be punishing someone for saving the internet.
Aftermath and Legacy
Return to Security Research
After his legal troubles concluded, Hutchins returned to security research. He continues to analyze malware, write about threats, and contribute to the defensive security community.
His case, however, left lasting scars on the relationship between security researchers and law enforcement.
The Chilling Effect
If a hero who saved billions of dollars in damages can be arrested for teenage code, what message does that send to young researchers? The Hutchins case reinforced a troubling pattern:
- Aaron Swartz: Prosecuted to the point of suicide for downloading academic papers
- Weev: Imprisoned for incrementing a URL
- Marcus Hutchins: Arrested for code written as a minor
The US government treats security researchers as threats, even when they demonstrably protect society.
Lessons for the Security Community
1. Your Past Can Follow You
Activities from years—even decades—ago can resurface. The statute of limitations for computer crimes is long, and digital evidence persists.
2. Fame Brings Scrutiny
Anonymous researchers operate with less risk than public figures. The decision to take credit for discoveries must be weighed against exposure to prosecution.
3. Redemption is Possible
Hutchins' case ultimately showed that judges can recognize growth and transformation. His sentence reflected his contributions, not just his crimes.
4. Community Support Matters
The security community's overwhelming support for Hutchins—financial, legal, and moral—likely influenced the lenient outcome. Solidarity protects researchers.
Conclusion
Marcus Hutchins saved the world from WannaCry, then spent two years fighting federal charges for code he wrote as a teenager. His story encapsulates the paradox of modern cybersecurity: the same skills that protect us can be criminalized, and the same people we celebrate can be prosecuted.
The judge got it right: redemption matters. Hutchins made mistakes as a young person, then dedicated his skills to protecting others. The law, for once, recognized the difference.
But the arrest never should have happened—not because Hutchins was innocent, but because the timing and circumstances suggested punishment for heroism rather than justice for crimes.
References
- Wired: The Confessions of Marcus Hutchins
- Krebs on Security: Marcus Hutchins Coverage
- MalwareTech Blog
For more stories of security researchers caught between heroism and prosecution, follow HackerDefense.
Covering the underground since 2020.

HackerDefense Report: c0mrade – The 15-Year-Old Who Hacked NASA and Paid the Ultimate Price
At 15, Jonathan James became the first juvenile incarcerated for cybercrime in U.S. history after breaching NASA and the Pentagon. At 24, facing accusations in the TJX breach he swore he didn't commit, he took his own life. This HackerDefense Report examines how America's war on hackers cost a young prodigy everything.

HackerDefense Report: Gary McKinnon – The UFO Hacker Who Fought Extradition and Won
Gary McKinnon faced 70 years in US prison for accessing military computers with blank passwords while searching for UFOs. After a decade-long battle, the UK blocked his extradition. This HackerDefense Report examines the case that changed UK-US extradition law.

HackerDefense Report: Weev – When Incrementing a URL Becomes a Federal Crime
Andrew 'weev' Auernheimer was sentenced to 41 months in federal prison for incrementing a number in a URL. This HackerDefense Report examines how the US government criminalized basic web browsing and the chilling effect on security research.