A Russian national was extradited to the United States from Switzerland over the weekend, to face charges for his alleged role in a scheme whose participants traded on information stolen from hacked U.S. companies.
The man, Vladislav Klyushin, 41, of Moscow, Russia, was arrested in Switzerland on March 21, 2021. Also known as Vladislav Kliushin, he was charged alongside four other Russians allegedly involved in the same scheme.
According to an indictment the United States Department of Justice unsealed on Monday, the individuals conspired to gain unauthorized access to computers and to commit wire fraud and securities fraud.
Ivan Ermakov, aka Ivan Yermakov, 35; Nikolai Rumiantcev, aka Nikolay Rumyantsev, 33; Mikhail Vladimirovich Irzak, aka Mikka Irzak, 43; and Igor Sergeevich Sladkov, 42, were also changed for their involvement in the scheme.
Ermakov, a former officer in Russia’s military intelligence agency Main Intelligence Directorate (GRU), was previously charged in the U.S. for his involvement in the hacking of the 2016 U.S. elections and for targeting international anti-doping agencies and sporting federations as part of hacking and disinformation operations.
[ READ: Russian Administrator of Bulletproof Hosting Sentenced to Prison in U.S. ]
According to the unsealed indictment, Klyushin, Ermakov and Rumiantcev worked at M-13, a Moscow-based company offering penetration testing services. They also offered investment management services, in exchange for up to 60% of the profit.
Between January 2018 and September 2020, the five individuals allegedly agreed to trade in the securities of public companies, based on non-public information obtained during intrusions at two U.S.-based filing agents.
The charging documents allege that the defendants harvested usernames and passwords that were later used to access the filing agents’ computer networks.
They allegedly viewed and downloaded material non-public information (MNPI) of hundreds of companies publicly traded on U.S. national securities exchanges and then purchased or sold the securities of those companies, based on whether they were about to announce positive or negative financial results.
Klyushin and his co-conspirators allegedly used multiple brokerage accounts, in their names and in the names of others, to trade securities in line with the illegally obtained information, which allowed them to earn tens of millions of dollars.
Ermakov, Rumiantcev, Irzak and Sladkov are still at large, the DoJ announced.
Related: Russian Who Helped Kelihos Malware Evade Detection Sentenced to 4 Years in Prison
Related: Russian Man Extradited to U.S. for Role in TrickBot Malware Development
Related: Ukrainians Extradited to U.S. for Providing Money Laundering Services to Cybercriminals

More from Ionut Arghire
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- US, Israel Provide Guidance on Securing Remote Access Software
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
