Saturday, January 18, 2025
HomeHacksMost Wanted Linkedin Hacker gets Extradition from Czech Court

Most Wanted Linkedin Hacker gets Extradition from Czech Court

Published on

SIEM as a Service

Follow Us on Google News

Most Wanted Linkedin Hacker gets Extradition from Czech Court, the court didn’t define to which country it is.

AleksandrovichNikulin was captured while on vacation in Prague in October 2016, in view of a global warrant issued by the US. The FBI blamed Nikulin for hacking LinkedIn, Dropbox, and Formspring in the traverse of five months in 2012.

Some of this information wound up on the web, by means of sites like LeakedSource. Nevertheless, he has over and over denied all allegations.

Through his legal advisors and Russian authorities, Nikulin asserted to have no PC skills.They say Nikulin was not a hacker and that his life spun around purchasing and offering luxury cars.

Nikulin’s Russian legal advisor, Vladimir Makeyev, said Nikulin was “useless with computers” and, a long way from being a super-programmer was equipped for checking his email and no more.

Nikulin Claims FBI demanded to admit hacks 

FBI Special Agent Jeffrey Miller, proof depends on “witness interviews including secret sources, ISP records, court-approved electronic interceptions, and different sources”.

A portion of the electronic captures were messages from the Gmail record of Alexei Belan who is Top 10 FBI’s most wanted list.

Nikulin wrote in a letter from jail that Miller requested him to concede hacking the DNC servers and guaranteed him good treatment on the off chance that he acknowledged competing.

But he dismisses the offer. His legal counselor showed that Nikulin was not a programmer, but rather only a victim of an FBI plot.

Mark Galeotti, a senior security specialist at the Institute of International
Relations Prague says "An FBI agent traveling from the US to a third country as
part of an extradition request is extremely unusual and highlights that the case
is seen as significant," Galeotti said to Guardian.

As indicated by US authorities, these hacks have channeled cash into Nikulin’s lavish life. Russian media has archived Nikulin’s way of life in articles, exhibiting his cars and friendship with different offspring of the Russian political elite.

Then again, Nikulin contended that he profited as a mechanic, by buying and selling cars, and not from hacking.

Nikulin has stopped an interest against the relocation choice, and his case will go to the Czech High Court for another arrangement of hearings.

Also Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...

AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles

AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were...