This man might expose the Russian hacking operation

He's Ukrainian and he goes by the name "Profexer."
 By 
Colin Daileda
 on 
This man might expose the Russian hacking operation
Credit: Sergei Konkov/TASS via getty images

He's Ukrainian. He goes by the name "Profexer." And he's allegedly behind the software that kicked off the Great DNC Hacking of 2016—you know, the one that may have swayed an entire American presidential election.

Other personal details about the reportedly young man are vanishingly scarce, according to The New York Times, but its his professional credentials that may illuminate key parts of how the Russian government runs its hacking operations.

Profexer may not have been a Russian government operative himself, but he is the alleged author of the malware that helped Russian operatives hack the Democratic National Committee (and steal DNC emails) in an attempt to sway the 2016 United States presidential election in favor of President Donald Trump.

So: If the man himself doesn't work for Moscow, then who is he?

He built dangerous malware where few could find it

If you were one of the few who found themselves adept at uncovering malware code on the Russian-language dark web a few months ago, you might have come across Profexer's work.

Per the Times, his malware, called P.A.S. web shell, was the only one mentioned in the Department of Homeland Security's first report about Russian hacking in the U.S. election. And let's say you were able to find it, by chance? The malware was free. Profexer made his money on the people who wanted customized versions of that free stuff. The man was reportedly respected enough to earn both awe and cash.

He was scared once officials found his malware

Profexer dismantled his dark web site once his malware showed up in the DHS report. Six days later, he reassured fellow hackers that no one had killed him. In a brief debate with another hacker over the possibility of his capture, he said authorities would be able to find him without a problem, "it depends only on politics."

He turned himself in after U.S. officials identified his malware

Rather than wait, Profexer walked out from behind his computer. Ukrainian law enforcement didn't arrest him, reportedly because the man behind the malware built it without using it. Officials did, however, acquaint Profexer with the FBI, for whom he is now a witness.

He knows who used his creations...sort of

Profexer knows the people who used his malware, but only in the same way we know Profexer—by their screennames.

If he can identify which users were likely Russian operatives, more questions might be answered, and officials might better understand how the Russian government runs cyberoperations. Do they, as The Times suggested, spend more time looking for useful malware, rather than developing it themselves? Are Russian cyber officials as much crowdsourcers as they are hackers, gathering the best tools they can find before aiming them at their own targets? And was this effective enough to count government subcontracting hacker-built software as the future of diplomatic warfare?

Needless to say: More to come.

Topics Cybersecurity

Mashable Image
Colin Daileda

Colin is Mashable's US & World Reporter. He previously interned at Foreign Policy magazine and The American Prospect. Colin is a graduate from Columbia University Graduate School of Journalism. When he's not at Mashable, you can most likely find him eating or playing some kind of sport.

Mashable Potato

Recommended For You

Connor Storrie shares a surprising 'Heated Rivalry' story in Seth Meyers interview
Seth Meyers interviews Connor Storrie on "Late Night."

'Heated Rivalry' fans in Russia are breaking antigay laws to stream the show
Connor Storrie and Hudson Williams, stars of Heated Rivalry, pose with bottles of champagne.

Florida man uses ChatGPT to sell his home. This is a real headline.
A pair of hands typing on a laptop as glowing images of houses float over their hands. The word "AI" glows in the middle.


Trending on Mashable
NYT Connections hints today: Clues, answers for April 4, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 4, 2026
Wordle game on a smartphone

NYT Strands hints, answers for April 4, 2026
A game being played on a smartphone.

NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!