Russian businessman, others made millions in insider trading through hacking — US | Inquirer News

Russian businessman, others made millions in insider trading through hacking — US

/ 06:24 AM December 21, 2021

Acting U.S. Attorney Nathaniel Mendell speaks to reporters after Vladislav Klyushin, a Kremlin-linked Russian businessman accused of participating in a multi-million dollar scheme to trade on insider information obtained through hacking, was extradited from Switzerland to the U.S., at the federal courthouse in Boston, Massachusetts, U.S., December 20, 2021.   REUTERS/Brian Snyder

Acting U.S. Attorney Nathaniel Mendell speaks to reporters after Vladislav Klyushin, a Kremlin-linked Russian businessman accused of participating in a multi-million dollar scheme to trade on insider information obtained through hacking, was extradited from Switzerland to the U.S., at the federal courthouse in Boston, Massachusetts, U.S., December 20, 2021. REUTERS/Brian Snyder

BOSTON — Five Russians including a Kremlin-linked businessman now in U.S. custody carried out a vast, $82 million insider trading scheme that allowed them to profit from corporate information stolen through hacking, U.S. authorities said on Monday.

Vladislav Klyushin, the owner of a Moscow-based information technology company that prosecutors said had extensive ties to the Russian government, was extradited on Saturday from Switzerland to face conspiracy, securities fraud and other charges in Boston.

Article continues after this advertisement

Klyushin, who was arrested in Switzerland in March while on a ski trip, appeared briefly from a Massachusetts jail during a virtual court hearing. A bail hearing is tentatively set for Thursday.

FEATURED STORIES

Prosecutors accused him and others of trading on corporate earnings reports obtained by hacking into the computer systems of two vendors that help companies filing quarterly and annual reports with the U.S. Securities and Exchange Commission. (SEC)

Those companies included IBM Corp, Snap Inc and Tesla Inc. Prosecutors said Klyushin, 41, and employees of his company M-13 LLC placed trades for themselves as well for clients in exchange for a cut of their profits.

Article continues after this advertisement

Authorities said the computer systems were hacked into by Ivan Yermakov, an M-13 employee who was among several Russian military intelligence officers charged in 2018 with carrying out hacking schemes to interfere in the 2016 presidential election and target anti-doping agencies.

Article continues after this advertisement

The scheme in total netted at least $82.5 million from 2018 to 2020, the SEC said in a related lawsuit.

Article continues after this advertisement

Yermakov remains at large, along with three other defendants: M-13 director Nikolai Rumiantcev and two Russian businessmen who prosecutors say traded on the hacked information, Mikhail Irzak and Igor Sladkov.

They could not be reached for comment.

Article continues after this advertisement

Klyushin’s lawyers have called the case politically motivated and argued the real reason he was sought was his work and contacts within the Russian government, which calls the case part of part of a hunt for Russians by Washington.

But while Acting U.S. Attorney Nathaniel Mendell stressed Klyushin’s “extensive ties” to the Kremlin, he said authorities did not know at the outset of the two-year probe “where the facts and investigation would lead us.”

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TAGS: Kremlin

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.