The Russian national arrested this month by Czech police in cooperation with the FBI is believed to have been involved in the hacking of social media company LinkedIn in 2012.
Czech police announced on Wednesday that they had arrested a Russian citizen suspected of launching cyberattacks on the United States. Since the announcement came shortly after the U.S. formally accused the Russian government of hacking political organizations, some believed the arrest might be connected to the attacks attributed by experts to sophisticated Russia-linked cyber espionage groups.
However, LinkedIn said the man arrested by Czech authorities is actually tied to the 2012 breach that affected well over 100 million of its users. A U.S. official confirmed for Reuters that the suspect is not believed to be linked to the recent politics-related cyberattacks.
”Following the 2012 breach of LinkedIn member information, we have remained actively involved with the FBI’s case to pursue those responsible,” LinkedIn stated. “We are thankful for the hard work and dedication of the FBI in its efforts to locate and capture the parties believed to be responsible for this criminal activity.”
Czech authorities now have to decide if they will extradite the suspect to the United States. However, Russian news agency TASS reported that authorities in Moscow insist that the man be handed over to Russia.
The BBC said the man was identified as 29-year-old Yevgeniy N. He was reportedly arrested by Czech police on October 5.
Until recently, the world believed the 2012 LinkedIn breach affected only 6.5 million accounts. However, in May, hackers offered to sell 167 million LinkedIn accounts, including 117 million that included passwords, for 5 bitcoins ($2,200).
Two individuals, known online as “Peace” and “Tessa88,” had offered to sell the LinkedIn data. However, an investigation conducted by security firm InfoArmor revealed that LinkedIn and other popular services that suffered serious data breaches in around the same period may have been targeted by professional black hat hackers from Eastern Europe.
The same hackers are also believed to be connected to the massive 2014 breach suffered by Yahoo. The tech giant blamed the attack on a state-sponsored actor, but InfoArmor said a state-sponsored party may have actually acquired the Yahoo data from the black hat hackers.
Related: 50 Hackers Using Lurk Banking Trojan Arrested in Russia
Related: US Jury Convicts Russian MP’s Son for Hacking Scheme

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
Latest News
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
- Consolidate Vendors and Products for Better Security
