Thursday, February 27, 2025
HomeCyber AttackFinland’s Most-Wanted Hacker Arrested in France

Finland’s Most-Wanted Hacker Arrested in France

Published on

SIEM as a Service

Follow Us on Google News

A 25-year-old Finnish man named Julius “Zeekill” Kivimäki was taken into custody this week in France. He is facing charges of extorting an online psychotherapy practice based in his local area and causing the confidential therapy notes of over 22,000 patients to be leaked online.

The individual in question was not only demanding ransom payments from the victims but also went as far as to leak highly sensitive and private information on a website accessible through the Tor network

On February 3rd, a suspect was taken into custody by French authorities. The individual remains under detention in France as the process for their extradition to Finland is ongoing. The suspect is yet to be transferred to Finland, and as of now, they remain in the custody of French law enforcement.

In the latter part of October 2022, a significant development took place in the case of Kivimäki. The individual was accused of trying to blackmail the Vastaamo Psychotherapy Center for financial gain. The charges against Kivimäki indicate that he attempted to extort money from the organization.

A cyberattack took place in October 2020, targeting the Vastaamo Psychotherapy Center. The hacker, who went by the moniker “Ransom Man,” compromised sensitive patient information and threatened to make it public unless Vastaamo paid a substantial ransom amount, estimated to be in the six figures.

Extorting Hacked Data

After Vastaamo declined to pay the ransom demand made by the hacker known as “Ransom Man,” the individual shifted their focus to extorting individual patients. 

The hacker targeted patients directly, sending them threatening emails that stated that their therapy notes would be made public unless they paid a ransom of 500 euros.

Around the same time as the events described above, Kivimäki faced legal repercussions for his alleged involvement in the breach. 

The Helsinki District Court issued an arrest warrant for Kivimäki, charging him with multiple offenses, including attempted extortion, computer break-in, and the unauthorized dissemination of personal information. 

Ransom Man, who initially aimed to extort patients directly, failed to achieve much success in their endeavors. As a result, he turned to the dark web as a means of monetizing their actions. 

He uploaded a massive compressed file to the dark web which comprised the complete records of all the patients whose information he had stolen.

Security experts were quick to uncover a mistake made by Ransom Man when they analyzed the large compressed file that had been uploaded to the dark web. They discovered that the file contained an entire copy of Ransom Man’s home folder. 

This folder provided valuable insights into the identity of the cybercriminal, as it contained many clues pointing towards the involvement of Kivimäki. 

Arrest of Kivimäki

On February 3rd, Kivimäki was apprehended by the authorities in Courbevoie, France following a report of domestic violence, and the arrest took place early in the morning, at around 7 a.m.

Kivimäki was reported to have been involved in a domestic violence incident on the night of February 3rd. According to eyewitnesses, Kivimäki had been socializing with a woman at a local nightclub earlier that evening. 

The two later returned to the woman’s home, but an argument ensued between them. This disagreement escalated and eventually resulted in a domestic violence report being filed with the authorities.

Kivimäki first gained notoriety as a self-proclaimed member of the Lizard Squad, a group of hackers known for their focus on DDoS attacks. Although the group is mostly composed of low-skilled individuals, they have caused significant disruption through their hacking activities.

Nicknames of the Attacker

Here below we have mentioned the nicknames used:-

  • Ryan
  • RyanC
  • Ryan Cleary

In 2012, Kivimäki and other members of the hacking group HTP were engaged in a widespread operation to exploit vulnerabilities in web servers. 

Kivimäki, who went by the alias Ryan Cleary, was particularly involved in this effort and took things a step further by offering access to these compromised servers for sale in the form of a distributed denial of service (DDoS) service-for-hire. 

Using a previously unknown vulnerability in Adobe’s ColdFusion software, Kivimäki was able to crack more than 60,000 web servers in 2013.

An American Airlines flight was grounded due to the bomb threat made by Kivimäki against John Smedley, the former president of Sony Online Entertainment.

As part of his criminal activities, Kivimäki also threw bomb threats at police stations and reported different incidents of “swatting.”

Kivimäki was found guilty of being the mastermind behind over 50,000 cyber offenses. His actions resulted in him being convicted of orchestrating a vast number of cybercrimes, making him one of the most prolific perpetrators in the history of cybercrime.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...