Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal

Aleksanteri Kivimäki, the Finnish cybercriminal convicted of more than 20,000 counts of attempted extortion after hacking a psychotherapy center, was released from custody on Thursday as he appeals his case.

After two days of testimony this week, the Helsinki Court of Appeal decided to release Kivimäki as his trial continues into November, partially due to his long pretrial detention, as reported by the Helsinki Times.

Kivimäki, who denied all the charges, has been in custody since 2023, when he was arrested in France and extradited to Finland. The release does not overturn his previous conviction and sentence for six years and three months, but under Finnish law he is presumed innocent while appealing the conviction.

His release is the latest chapter in one of Europe’s most significant criminal data privacy cases, with the hacker — who previously had been convicted as a teenager for his involvement with the “griefing” collective Lizard Squad — found guilty of attempting industrial-scale extortion against the clients of the Vastaamo therapists.

Lawyers representing his victims told journalists this week that their clients are still suffering as a result of the hack. As a whole the case “has deeply shaken Finnish society,” according to a feature-length report about the incident in the Christian Science Monitor, where the hack was described as “a watershed event for Finland.”

The hack of Vastaamo took place in 2018, but was made public in 2020 when Kivimäki allegedly began to extort individual patients by threatening to publish their stolen information and therapy details online unless they paid him.

More than 24,000 people reported receiving such an extortion attempt to the Finnish police — a record number of victims in a criminal trial. According to reports, many of the victims were children or receiving treatment for severe trauma.

The stolen documents were subsequently uploaded to the dark web. However, as reported by independent journalist Brian Krebs, the uploaded files also contained a copy of the perpetrator’s home folder, which “exposed a number of clues” pointing to Kivimäki.

Kivimaki has claimed the investigation against him was poorly conducted and his conviction based on circumstantial evidence. He has denied using virtual servers linked to the hack and disputed the relevance of cryptocurrency transactions allegedly linking him to the extortion.

Prosecutors “referred to forensic connections between server logs, bitcoin transactions, and materials linking the server contents to Kivimäki, including personal photographs and email usage,” reported the Helsinki Times.

The trial is ongoing. The Helsinki Court of Appeal is expected to issue a ruling later this year.

CybercrimeNewsPeople
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

CISA official calls on lawmakers to extend cyber info-sharing law

Next Post

Cyberattacks against schools driven by a rise in student hackers, ICO warns

Related Posts

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices

Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including
Read More

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a previously undocumented USB worm called SnakeDisk. "The worm only executes on devices with Thailand-based IP addresses and drops the Yokai backdoor," IBM X-Force researchers Golo Mühr and Joshua Chung said in an analysis published last week. The tech giant's
Read More

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now. Get the complete Holiday Season Security Playbook here. Bottom Line Up Front The 2024 holiday season saw major
Read More