Close Menu
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations

Trending

The targeting chain: how the IRGC exploits MTN-Irancell’s Gulf telecom connections to guide its missiles

March 5, 2026

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
Home»Cyber
Cyber

Russian hacker used U.S. company system to hack Ukraine government

Staff WriterBy Staff WriterJuly 3, 20245 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!

The Federal Bureau of Investigation is offering a $10m USD reward for the capture of a Russian computer hacker responsible for launching a string of damaging cyber attacks in the U.S. and Ukraine.

The FBI have placed Amin Timovich Stigal on the Bureau’s most wanted list after allegedly conducting a series of highly damaging cyber attacks on the Ukrainian government just prior to the launch of the Russian invasion in February 2022.

Source: FBI

The Bureau’s website is currently carrying a picture of Stigal stating that he is wanted for “conspiracy to commit computer intrusion and damage.”

FBI investigators believe the 22-year-old has been collaborating with Russia’s Main Intelligence Directorate (GRU) in targeting Ukrainian government networks, including those of the Ministries of Foreign Affairs, Education and Energy.

U.S. government computers, including sites maintained by a Maryland agency, were also targeted, and a cyber attack was carried out on the transport infrastructure of what is described as an unnamed Central European ally.

According to the FBI, Stigal allegedly created accounts on computer systems belonging to a U.S.-based messaging and communications company which he then used to carry out the attacks. The accounts were then used to scan numerous public websites of the Ukraine government to identify vulnerabilities for attack.

The attacks used malware, a malicious software designed to cause disruption to a device, referred to as “WhisperGate”.

WhisperGate included a fake ransomware message that tricked people into paying to “unlock” their files, but instead it actually deleted everything. Data was destroyed and could not be recovered, even if the ransom of $10,000 was paid.

Linda Zecher, the CEO of the Cyber Security company IronNet, told National Security News: “This is a classic and highly effective form of a cyber attack from a hostile state – in this case Russia, which is effectively sub-contracting out cyber warfare. WhisperGate is a very damaging type of malware and every government organisation and corporation should be aware of the risk.

“IronNet believes that collective defense is the best way to prevent these attacks from damaging networks. Cyber attacks are only going to get more sophisticated and damaging which is why a robust defence network is vital.”

According to the court records, Stigal and his conspirators in the GRU stole and leaked data belonging to thousands of Ukrainian citizens, which included criminal and medical records. This was described as an attempt to spread fear about the security of government systems and Ukrainian’s personal information before Russia’s invasion.

Websites were also defaced with the following message: “Ukrainian! All the information about you has become public, be afraid and expect the worst. This is for your past, present and future.”

An arrest warrant was issued in Maryland on June 25, 2024, charging Stigal with conspiracy to commit computer intrusion and damage.

Merrick B. Garland, Attorney General, said in a statement: “The defendant conspired with Russian military intelligence on the eve of Russia’s unjust and unprovoked invasion of Ukraine to launch cyberattacks targeting the Ukrainian government and later targeting its allies, including the United States.”

Stigal was born in Grozny, Chechnya on 1 October 2002. His social media, dominated by cat profile pictures, offers little insight into the man behind the keyboard of the alleged cyber attacks.

National Security News (NSN) identified an Instagram account linked to Stigal, with a biography that reads “Money Hunter”.

A Pinterest account offered another name, “Gadkiy Chechen” which translates to Nasty Chechen.

Instagram account with no posts. The profile follows Tim Stigal, Binance a cryptocurrency exchange, and an account linked to a Forex broker company.

NSN also found a recent profile on VK, a Russian social media platform, with the username “fearoftheemperor.” The profile itself offered little information, but it included a post from June 27th – just two days after Stigal’s arrest warrant was issued. The post listed two cryptocurrency addresses, currently empty of funds.

Profile with username fearoftheemperor with date of birth 1 October 2002. Bitcoin (BTC) address has zero value, the Tether (USDT TRC20) had a previous balance of 1049.22 in May, which is now nil.

Another social media profile was found to be last active on the same date as the VK account. Historic posts from this account in 2017 refer to hacking and asking questions on how to disable someone’s internet.

Profile for “Amin Stigal” on Russian social networking service. Profile lists date of birth as 1 August 2002 and location as Khasavyurt, Dagestan, Russia. The profile dates back to at least 2015, where posts include questions posted about computer systems and games.
Posts from 2017 ask for “Help with hacking” and disabling the internet.

NSN also identified an older VK profile, possibly belonging to Stigal due to a matching fabricated birthdate with FBI records. The profile, however, offered little beyond a connection to a secondary school in Khasavyurt, Dagestan, an area to which Stigal has connections, according to the FBI. 

Profile matching the fake data of birth listed by the FBI. Under education it lists Secondary School No.1 in Khasavyurt.

Reports indicate Stigal’s father, Tim Vakhaevich Stigal, is also wanted in the U.S. in connection to separate cyber crime activity.

In January 2024, Tim Stigall was accused of hacking into computers to steal debit and credit card and personal data associated with cardholders. He is alleged to have targeted companies based in Pennsylvania, California and Virginia.

The U.S. Department of Justice said: “[Tim] Stigal additionally transmitted a threat to impair the confidentiality of stolen personal data belonging to customers of the corporate victim if a ransom was not paid to Stigal.”

Unlike his son, Tim Stigal does not hide his online presence, NSN identified accounts on various platforms, and a website, where Tim posts about Forex trading and cryptocurrency. He has also written book on trading and Islam, and ancient mythology.

Amin Stigal cyber cyber attack russia WhisperGate
Staff Writer

Keep Reading

ITC Secure and IronNet unite to form Collective Defence

Epstein was probably a Russian spy, says Polish Prime Minister

Putin orders Russian troops to execute prisoners of war in the run up to peace talks

Scientists at secret military base at centre of Novichok murder probe fear their details may have been stolen by cyber criminals

Two leading cyber companies sign agreement to launch AI powered cyber security defence system

Russia targets UK’s military satellites – head of Space Command warns.

Editor's Picks

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026

Who will be the next Iranian Supreme leader?

March 2, 2026

Trending

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Iran March 3, 2026

Who will be the next Iranian Supreme leader?

Iran March 2, 2026

Both ultimate shareholders of MTN-Irancell killed in US-Israeli strikes: what it means for South Africa’s most toxic asset

Iran March 1, 2026
Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact
Home Topics Podcast NSN Lists

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?