US offers $1 million for details on alleged Russian hacker

Avatar

The U.S. State Department on Thursday announced it is offering a $1 million reward for information on a Russian hacker responsible for “multiple significant” computer intrusions against American targets.

The agency is offering the money through its Rewards for Justice program for information on the whereabouts of Tim Vakhaevich Stigal, who was charged by the Justice Department in January with participating in four different conspiracies to traffic in stolen payment card information belonging to the customers of at least three separate corporate victims between 2014 and 2016.

Stigal was charged with four counts of wire fraud conspiracy, 12 counts of wire fraud, one count of computer fraud extortion, three counts of access device fraud and three counts of aggravated identity theft.

His malicious cyberactivity landed him on the U.S. Secret Service’s Most Wanted Fugitive page.

The reward announcement comes the day after the U.S.government cracked down on a Russian-linked influence network that pumped out disinformation to the American public ahead of the upcoming presidential election.

For its part, the State Department said it would go after the operations of Rossiya Segodnya, the parent company of state broadcaster Russia Today, and put in place a new visa restriction policy for the firm’s subsidiaries. 

The department also announced a $10 million reward for information on individuals involved in the RT-linked Russian hacking group RaHDit.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

 

Total
0
Shares
Previous Post

Microchip Technology says employee contact info stolen by hackers during cyberattack

Next Post

Use of Predator spyware rebounds after a dip from Biden sanctions, researchers say

Related Posts

Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. "This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance," the company
Avatar
Read More

Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability

Microsoft has released security fixes to address a massive set of 126 flaws affecting its software products, including one vulnerability that it said has been actively exploited in the wild. Of the 126 vulnerabilities, 11 are rated Critical, 112 are rated Important, and two are rated Low in severity. Forty-nine of these vulnerabilities are classified as privilege escalation, 34 as remote code
Avatar
Read More