
The Consequences of Digital Revenge: A Case Study
Engaging in revenge against an employer, especially through illicit digital actions, can lead to severe repercussions. A cautionary tale emerged when an IT professional named David Lu learned this the hard way after utilizing a killswitch that severely disrupted his company’s operations following his suspension.
Background: Employment and Dismissal
According to a report by Bleeping Computer, the U. S.Department of Justice (DoJ) revealed details surrounding Lu’s actions that led to his sentencing. Initially hired in November 2007 as a software developer at Eaton Corporation, his career faced a downturn following a company-wide restructuring in 2018, which resulted in diminished access to vital systems and a significant reduction in his responsibilities.
Devastating Digital Sabotage
By April 2019, Lu decided to retaliate against his employer by introducing malicious code into the company’s infrastructure. While specifics about how he accessed sensitive components remain unclear, evidence suggests he implemented infinite loops in various code sections. This action burdened system resources, causing frequent crashes and operational failures.
The Creation of the Killswitch
Lu developed a malicious killswitch named IsDLEnabledinAD, which was an acronym for “Is David Lu Enabled in Active Directory?”This code was designed to regularly check if Lu’s credentials were still active within the system. If it detected any deactivation, it would lock all users from the Active Directory, essentially incapacitating the company’s access to its own systems.
This killswitch was triggered on September 9, 2019, coinciding with Lu’s administrative leave and the request for him to return his laptop.

The Fallout and Legal Ramifications
Matthew R. Galeotti, Acting Assistant Attorney General for the DoJ’s Criminal Division, highlighted the extensive impact of Lu’s actions, which resulted in thousands of employees being locked out of crucial systems and losses amounting to hundreds of thousands of dollars for the company. Additionally, Brett Leatherman, Assistant Director of the FBI’s Cyber Division, emphasized the agency’s commitment to holding cybercriminals accountable:
The FBI works relentlessly every day to ensure that cyber actors who deploy malicious code and harm American businesses face the consequences of their actions. I am proud of the FBI cyber team’s work which led to today’s sentencing and hope it sends a strong message to others who may consider engaging in similar unlawful activities.
Lessons Learned
It is concerning that an employee could gain sufficient access to deploy such harmful code, raising questions about the company’s cybersecurity and audit processes. Lu’s extensive tenure at the firm likely provided him with intimate knowledge of its system architecture, which he exploited during his vengeful attempt to inflict damage.
Following his trial, Lu was sentenced to four years in prison and an additional three years of supervised release. His internet search history revealed attempts to escalate privileges and conceal harmful activities, underscoring the potential risks posed by disgruntled employees in the tech industry.
For those interested in staying informed about cybersecurity trends and threats, this case serves as a stark reminder of the importance of robust internal security measures and the potential consequences of digital misconduct.
Leave a Reply