CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. PETR NIKOLAYEVICH PLISKIN
Back to CasesMore Cases
Multiple international victims including critical infrastructure providers, political organizations, and Olympic-related entities

The person at the center of this case

Multiple international victims including critical infrastructure providers, political organizations, and Olympic-related entities

Case
#1040
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Western District of Pennsylvania; Federal Bureau of Investigation
Cold Case · Open
5 years waiting · since 2020

PETR NIKOLAYEVICH PLISKIN

Justice for Multiple international victims including critical infrastructure providers, political organizations, and Olympic-related entities — the trail went cold in 2020, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

What is Pliskin's current location and identity? Has he fled Russia or assumed an alias?

🔍
evidence
Lead #2

What specific role did Pliskin play in deploying NotPetya malware and compromising critical infrastructure systems?

💡
clue
Lead #3

How can international law enforcement locate and apprehend a Russian military intelligence officer operating from Moscow?

On October 15, 2020, a federal grand jury indicted Petr Nikolayevich Pliskin, a Russian military intelligence officer assigned to Unit 74455, for his role in a sophisticated computer hacking conspiracy targeting critical infrastructure, political campaigns, and international organizations worldwide. Pliskin and five co-conspirators allegedly deployed destructive malware including NotPetya, compromised systems in Ukraine, France, Georgia, and those connected to the 2018 Winter Olympics and nerve agent investigations. He remains at large, last known to be in Moscow, Russia, and continues to be sought by U.S. federal authorities for conspiracy, wire fraud, identity theft, and intentional damage to protected computers.

Case
#1040
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Western District of Pennsylvania; Federal Bureau of Investigation

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

👤
person
Lead #4

Who are the five co-conspirators and what are their current whereabouts?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy to Commit an Offense Against the United States; False Registration of a Domain Name; Conspiracy to Commit Wire Fraud; Wire Fraud; Intentional Damage to Protected Computers; Aggravated Identity Theft Caution: On October 15, 2020, a federal grand jury sitting in the Western District of Pennsylvania returned an indictment against six Russian military intelligence officers for their alleged roles in targeting and compromising computer systems worldwide, including those relating to critical infrastructure in Ukraine, a political campaign in France, and the country of Georgia; international victims of the “NotPetya” malware attacks (including critical infrastructure providers); and international victims associated with the 2018 Winter Olympic Games and investigations of nerve agent attacks that have been publicly attributed to the Russian government. The indictment charges the defendants, Petr Nikolayevich Pliskin, Yuriy Sergeyevich Andrienko , Sergey Vladimirovich Detistov , Pavel Valeryevich Frolov , Anatoliy Sergeyevich Kovalev , and Artem Valeryevich Ochichenko , with a computer hacking conspiracy intended to deploy destructive malware and take other disruptive actions, for the strategic benefit of Russia, through unauthorized access to victims’ computers.

The indictment also charges these defendants with false registration of a domain name, conspiracy to commit wire fraud, wire fraud, intentional damage to protected computers, aggravated identity theft, and aiding and abetting those crimes. The United States District Court for the Western District of Pennsylvania issued a federal arrest warrant for Petr Nikolayevich Pliskin upon the grand jury’s return of the indictment.

Remarks: Pliskin is alleged to have been a Russian military intelligence officer, assigned to Unit 74455. He was last known to be located in Moscow, Russia.

Timeline of Events

🕵️
2020-10-15

Federal Indictment Returned

A federal grand jury in the Western District of Pennsylvania returned an indictment against Pliskin and five co-conspirators for computer hacking conspiracy, wire fraud, identity theft, and intentional damage to protected computers.

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:October 15, 2020
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:October 15, 2020
Last Updated:April 29, 2026