Thursday, January 30, 2025
HomeHacksMost Wanted Linkedin Hacker gets Extradition from Czech Court

Most Wanted Linkedin Hacker gets Extradition from Czech Court

Published on

SIEM as a Service

Follow Us on Google News

Most Wanted Linkedin Hacker gets Extradition from Czech Court, the court didn’t define to which country it is.

AleksandrovichNikulin was captured while on vacation in Prague in October 2016, in view of a global warrant issued by the US. The FBI blamed Nikulin for hacking LinkedIn, Dropbox, and Formspring in the traverse of five months in 2012.

Some of this information wound up on the web, by means of sites like LeakedSource. Nevertheless, he has over and over denied all allegations.

Through his legal advisors and Russian authorities, Nikulin asserted to have no PC skills.They say Nikulin was not a hacker and that his life spun around purchasing and offering luxury cars.

Nikulin’s Russian legal advisor, Vladimir Makeyev, said Nikulin was “useless with computers” and, a long way from being a super-programmer was equipped for checking his email and no more.

Nikulin Claims FBI demanded to admit hacks 

FBI Special Agent Jeffrey Miller, proof depends on “witness interviews including secret sources, ISP records, court-approved electronic interceptions, and different sources”.

A portion of the electronic captures were messages from the Gmail record of Alexei Belan who is Top 10 FBI’s most wanted list.

Nikulin wrote in a letter from jail that Miller requested him to concede hacking the DNC servers and guaranteed him good treatment on the off chance that he acknowledged competing.

But he dismisses the offer. His legal counselor showed that Nikulin was not a programmer, but rather only a victim of an FBI plot.

Mark Galeotti, a senior security specialist at the Institute of International
Relations Prague says "An FBI agent traveling from the US to a third country as
part of an extradition request is extremely unusual and highlights that the case
is seen as significant," Galeotti said to Guardian.

As indicated by US authorities, these hacks have channeled cash into Nikulin’s lavish life. Russian media has archived Nikulin’s way of life in articles, exhibiting his cars and friendship with different offspring of the Russian political elite.

Then again, Nikulin contended that he profited as a mechanic, by buying and selling cars, and not from hacking.

Nikulin has stopped an interest against the relocation choice, and his case will go to the Czech High Court for another arrangement of hearings.

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...