Wednesday, April 16, 2025
HomeHacksMost Wanted Linkedin Hacker gets Extradition from Czech Court

Most Wanted Linkedin Hacker gets Extradition from Czech Court

Published on

SIEM as a Service

Follow Us on Google News

Most Wanted Linkedin Hacker gets Extradition from Czech Court, the court didn’t define to which country it is.

AleksandrovichNikulin was captured while on vacation in Prague in October 2016, in view of a global warrant issued by the US. The FBI blamed Nikulin for hacking LinkedIn, Dropbox, and Formspring in the traverse of five months in 2012.

Some of this information wound up on the web, by means of sites like LeakedSource. Nevertheless, he has over and over denied all allegations.

Through his legal advisors and Russian authorities, Nikulin asserted to have no PC skills.They say Nikulin was not a hacker and that his life spun around purchasing and offering luxury cars.

- Advertisement - Google News
Nikulin’s Russian legal advisor, Vladimir Makeyev, said Nikulin was “useless with computers” and, a long way from being a super-programmer was equipped for checking his email and no more.

Nikulin Claims FBI demanded to admit hacks 

FBI Special Agent Jeffrey Miller, proof depends on “witness interviews including secret sources, ISP records, court-approved electronic interceptions, and different sources”.

A portion of the electronic captures were messages from the Gmail record of Alexei Belan who is Top 10 FBI’s most wanted list.

Nikulin wrote in a letter from jail that Miller requested him to concede hacking the DNC servers and guaranteed him good treatment on the off chance that he acknowledged competing.

But he dismisses the offer. His legal counselor showed that Nikulin was not a programmer, but rather only a victim of an FBI plot.

Mark Galeotti, a senior security specialist at the Institute of International
Relations Prague says "An FBI agent traveling from the US to a third country as
part of an extradition request is extremely unusual and highlights that the case
is seen as significant," Galeotti said to Guardian.

As indicated by US authorities, these hacks have channeled cash into Nikulin’s lavish life. Russian media has archived Nikulin’s way of life in articles, exhibiting his cars and friendship with different offspring of the Russian political elite.

Then again, Nikulin contended that he profited as a mechanic, by buying and selling cars, and not from hacking.

Nikulin has stopped an interest against the relocation choice, and his case will go to the Czech High Court for another arrangement of hearings.

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe...

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

A recent report by Cyble has shed light on the evolving tactics of hacktivist...

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen...