Skip to main content

Canadian man charged in 2014 Yahoo breach expected to plead guilty in the U.S.

Yahoo
Image used with permission by copyright holder
Karim Baratov, a Canadian citizen who the U.S. accused of helping Russian intelligence operatives hack Yahoo accounts in 2014, is expected to plead guilty next week, Reuters reports.

Baratov recently waived his right to fight the request for extradition from Canada and will appear in federal court in San Franciso this coming Tuesday.

Recommended Videos

The 22-year old Baratov is a Canadian citizen who was born in Kazakhstan. Last March, Canadian law enforcement arrested him at the request of U.S. prosecutors, alleging that he helped with the 2014 Yahoo breach.

Please enable Javascript to view this content

In March, the Department of Justice filed charges against Baratov and three other men for their part in the 2014 theft. Two of the men were part of Russia’s Federal Security Service. The information obtained from the reports implies that the Russian agents were the ringleaders of the operation. Alexsey Belan, one of the FBI’s most wanted cybercriminals, was the one who carried out the actual hack of Yahoo’s server.

Baratov was apparently brought on when it was discovered that victims of the hack had non-Yahoo email addresses. Baratov is alleged to have hacked at least 80 non-Yahoo email accounts, with 50 of those hacked accounts reported to be Gmail accounts.

As of right now, the exact targets of the hack have not been revealed, but we do know the FSB agents sought information on Russian officials, a wealthy banker, and the leader of a metals company.

Despite the charges, Baratov is the only culprit to have been arrested in relation to this case. In August, he pleaded not guilty to several charges including “conspiring to commit computer fraud, conspiring to commit access device fraud, conspiring to commit wire fraud and aggravated identity theft.”

It is unclear what charges Baratov will be pleading guilty to on Tuesday, though court records indicate that the hearing will be a “change of plea” hearing overseen by U.S. District Judge Vince Chhabria.

It is currently unknown why Baratov is changing his plea. It is possible that he worked out a deal with prosecutors, which would make sense, given that he appears to be one of the least important actors in this hack.

Eric Brackett
Former Digital Trends Contributor
U.S. indicts Chinese hackers for stealing coronavirus vaccine research
A digital depiction of a laptop being hacked by a hacker.

Chinese hackers targeted U.S. biotech firms working on coronavirus vaccines and treatments, and other companies around the globe, according to U.S. prosecutors. 

The United States Department of Justice (DOJ) charged two hackers on Tuesday, July 21, for breaking into companies for their own profit, as well as at the behest of a Chinese civilian spy agency. The indictment states that the two “researched vulnerabilities in the networks of biotech and other firms publicly known for work on COVID-19 vaccines, treatments, and testing technology.”

Read more
The FBI accuses China of trying to steal U.S. coronavirus vaccine research
coronavirus taiwan asia technology success science researcher getty

The FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency have accused China of attempting to steal coronavirus vaccine research from the U.S.

“The FBI is investigating the targeting and compromise of U.S. organizations conducting COVID-19-related research by PRC-affiliated cyber actors and non-traditional collectors,” according to a joint announcement Wednesday.

Read more
Attacks from Chinese hacking group have spiked, U.S. firm says
hacks header

Attempted cyberattacks from a sophisticated Chinese hacking group have spiked since late January, according to cybersecurity firm FireEye Inc.

FireEye chief security architect Christopher Glyer said more than 75 of its customers were targeted in the attacks across more than a dozen countries, including the United States and Canada. The surge is “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years,” according to a post by FireEye on the cyberattacks.
"We haven’t seen something of this nature in at least three years," Glyer told Digital Trends.
The group behind the attacks was identified as “APT41,” a China-based team made of contractors working on behalf of the Chinese government, Glyer said.

Read more