Notorious Cyber Criminal Sentenced

A Young notorious hacker and one of Europe’s most wanted criminals has been jailed for blackmailing psychotherapy patients after stealing their personal medical notes. From teenage cyber criminal to one of Europe’s most wanted, Julius Kivimäki's imprisonment brings to an end an 11-year cyber crime career that started when he rose to prominence in a network of teenage hackers.

Julius Kivimäki started with a network of anarchic hacking gangs at the age of just 13 and is now aged 24. He was finally caught after he stole a total of 33,000 therapy patients had their records stolen and thousands were being blackmailed in what is the largest number of victims in a  criminal case in Finland.

The stolen database from the Vastaamo psychotherapy centre contained the deepest secrets of a cross-section of society including children. Sensitive conversations on subjects from extra-marital affairs to confessions of crimes were now a bargaining chip.

The impact of the subsequent threatening blackmail emails was immediate. Lawyer Jenni Raiskio, who represents 2,600 of the victims at the trial, said her firm had been contacted by people whose relatives had taken their own lives after the patient records were published online. She led a moment of silence in the court for the victims.

The blackmailer, known only as 'ransom_man' by his sign-off online, demanded victims pay him €200 Euros (£171) within 24 hours otherwise he would publish their information. If they didn't meet that deadline he increased it to €500.

About 20 people paid before the victims realised it was already too late. Their information was already published the day before when ransom_man accidentally leaked the entire database to a forum on the Dark Net.

Zeekill's Criminal Career

Kivimäki, who called himself Zeekill as a teenage hacker, did not become the notorious figure he is by being careful. As a teenager he was engaged hacking, extorting, working alongside hacker teams Lizard Squad and Hack the Planet he boasted of his exploits in causing chaos during his teenage years in the 2010s.

Kivimäki was responsible for carrying out dozens of high-profile attacks until, aged 17, he was arrested in 2014 and subsequently found guilty of 50,700 hacking offences.

Controversially, he was not jailed and his two-year suspended prison sentence was criticised by many commentators. While Finland has a comparatively lenient sentencing policy for teenagers, the fear was that Kivimäki and his accomplices, mostly other teenagers dispersed around the English-speaking world, would not be deterred.

Indeed, Kivimäki did not allow his first conviction to deter him. After his arrest, and before his sentence, he carried out one of the most audacious attacks of any teenage hacking gang. He and Lizard Squad took control the two largest gaming platforms offline over Christmas. Playstation Network and Xbox Live went down after the services were hit with an unsophisticated but powerful Distributed Denial of Service DDoS attack. Tens of millions of gamers were unable to download games, register new consoles or play with their friends online.

It took Finnish police nearly two years to gather the evidence to issue an Interpol Red Notice for him and he became one of Europe’s most wanted criminals.

But no-one knew where the now 25-year-old was.He was tracked down by mistake last February when police in Paris went to his apartment after getting a false domestic disturbance call. They found Kivimäki had been living with forged identity documents under a fake name.

From there, he was extradited to Finland where he stood trial in one of the most high-profile trials in the country’s history. He was sentenced to six years and three months in prison out of a maximum seven years, but he is likely to serve only half because of time already served and the Finnish justice system.

BBC     |     Noticiasaominuto     |     Twitter     |     Yahoo    |      The Bradenton Times     |     Reddit     |     BBC

You Might Also Read: 

Fortnite Teen Hackers 'Earning Thousands of Pounds a Week':

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers
Securing Critical Infrastructure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.