Cyber Crime

Russian national extradited to US for trading on stolen Information

A Russian national was extradited to the US from Switzerland after he was charged for trading information stolen from hacked U.S. companies.

The Russian national Vladislav Klyushin (41) was extradited to the United States from Switzerland to face charges for his alleged role in a scheme whose participants traded on information stolen from U.S. companies.

The man was arrested in Switzerland on March 21, 2021, along with four other accomplices he conspired to gain unauthorized access to computers and to commit wire fraud and securities fraud.

Kliushin was charged alongside four other Russians citizens, Ivan Ermakov (aka Ivan Yermakov, 35), Nikolai Rumiantcev (aka Nikolay Rumyantsev, 33), Mikhail Vladimirovich Irzak (aka Mikka Irzak, 43), and Igor Sergeevich Sladkov (42).

Ivan Yermakov worked for the Russian Military Unit 26165 and was indicted by the US DoJ in October 2018, along six other defendants working for the Russian Main Intelligence Directorate (GRU), for hacking, wire fraud, identity theft, and money laundering.

According to the unsealed indictment, Klyushin, Ermakov and Rumiantcev worked at M-13, a Russian cybersecurity firm offering penetration testing services and investment management services. For the latter service, the men were keeping for them up to 60% of the profit.

“Between at least in or about January 2018 and September 2020, Klyushin, Ermakov, Irzak, Sladkov and Rumiantcev allegedly agreed to trade in the securities of publicly traded companies based on material non-public information (“MNPI”) about the earnings of those companies, in advance of the public announcements of financial results.” reads the press release published by DoJ. “The MNPI was allegedly acquired through unauthorized intrusions into the computer networks of two U.S.-based filing agents (Filings Agents 1 and 2)—vendors that publicly traded companies used to make quarterly and annual filings through the U.S. Securities and Exchange Commission (SEC).”

Between January 2018 and September 2020, the defendants allegedly agreed to trade in the securities of publicly traded companies, based on non-public information obtained by hacking into systems at two U.S.-based filing agents.

The defendants deployed malicious code that harvested usernames and passwords that were used by the gang to access the filing agents’ networks.

The group then used the information gathered through the theft of the documents related to hundreds of companies publicly traded on U.S. national securities exchanges to purchase or sell the securities of those companies.

Klyushin and his co-conspirators allegedly used multiple brokerage accounts to trade securities, an activity that allow them to earn tens of millions of dollars.

Ermakov, Rumiantcev, Irzak and Sladkov are still at large.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, DoJ)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 49

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

7 minutes ago

Security Affairs newsletter Round 528 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

3 hours ago

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

1 day ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

1 day ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

2 days ago