Former Tech Guru’s Epic Fail: Malware Mayhem Lands Him 4 Years in the Slammer
A former Eaton developer, Davis Lu, was sentenced to four years for sabotaging the company’s servers with malware. After a demotion, he installed a “kill switch” that crashed the network when his access was revoked. His less-than-sneaky plan led to his arrest and conviction for intentionally damaging a protected computer.

Hot Take:
Well, it seems like Davis Lu took a page out of the “How to ruin your career in just one step” handbook: install a “kill switch” on your employer’s servers. Seriously, Davis, did you really think labeling your malware “IsDLEnabledinAD” was a masterstroke of stealth? That’s like a robber leaving a calling card with their name and address. Not to mention, trying to use your corporate credentials to upload malware is about as slick as leaving your wallet at the crime scene. Nice try, but it looks like your plan was as foolproof as a sieve. Four years in the slammer should give you plenty of time to think about better life choices or perhaps a career in writing crime novels with more believable plots.
Key Points:
- Davis Lu, a former Eaton developer, installed malware on company servers out of spite after being demoted.
- The malware was a Java program designed to crash the server by overloading it with non-terminating threads.
- Lu’s operation was less than covert, as evidenced by the malware’s name and use of his corporate credentials.
- His actions led to his arrest, a guilty verdict, and a four-year prison sentence.
- This incident highlights the significant threat posed by insider cyber threats.