VChK-OGPU and Rucriminal.info have identified the owner and developers of the main monopolist in the data mining market (trading in Russians' personal data)—Himera Search. The project is closely connected to the security forces—two former Interior Ministry officers are among its co-owners, one of whose brothers works for the Russian Federal Security Service (FSB). Himera Search provides illegal data mining services, operating openly on Telegram and throughout Russia and several CIS countries (even under official contracts), while other players are being purged. Meanwhile, its owners freely visit Russia and expand their business.

As we previously reported, Himera Search is backed by the developers of a whole host of similar information systems. All data mining websites have legal entities and a digital footprint. Even the flagship project, which previously operated as an LLC, is now owned by companies from Kyrgyzstan and Armenia.

 

The first mentions of Himera Search can be found on forums and chats, where accounts with the same name spammed advertisements about the resource's capabilities. The earliest we could find was a post on the hacker forum Forumteam.bet from October 2020. Subsequently, the promotion strategy shifted to a more traditional one.

 

The internet was flooded with advertisements for the site and its search bot. A couple of regional websites (a Birobidzhan news portal and a Vladimir TV channel) even retained the advertiser's contact information—Khimera LLC—in their promotional articles about Himera Search. The Moscow-based company was founded in 2017 and liquidated in June 2023.

The company's owner was an advertiser and marketer named Alexander Larchenkov from the Smolensk region. According to leaks, a month after the LLC's liquidation, he flew to Kyrgyzstan. The founder is also a member of other companies specializing in product promotion, but his role in Himera Search clearly wasn't limited to that.

 

The fact is that the user agreement on the Himera Search website currently lists Transtrade LLC as the contractor, which is based in Bishkek, where the former owner of Himera LLC was flying. The Kyrgyz company (located at the shopping center address) is headed by Kazakhstan resident Valery Maglaperidze. We spoke with him.

As the director of the current parent company of Himera Search told VChK-OGPU and Rucriminal.info, as a foreigner and friend of Alexander Larchenkov, he opened a company in Kyrgyzstan in his own name. According to Maglaperidze, he is aware of the resource his legal entity is covering, but is not doing anything illegal. And with Russian security forces, as Valery boasted, "everything is fine, everything is going smoothly."

 

Alexander Larchenkov himself was last active in Russian chats in 2023, playing football near Victory Park. Judging by a number of factors, individuals associated with him reside in Kazakhstan, where the owner of Himera Search could have seen eye to eye with Valeriy Maglaperidze.

 

It's worth noting that at least three other non-core websites operate under the guise of Transtrade LLC. These include CS2CASE.WIN, CS2CASE.IO, and VACASE.ME, which trade skins for the popular games CS and Valoran. However, this cyber-support is clearly not the project team's primary focus.

On the main Himera Search website, you can find another version of the user agreement, where the operator is listed as the Armenian company Orgsafe LLC instead of the Kyrgyz Transtrade LLC. And behind this screen, another security breach website was hidden.

 

Another resource very similar to the other projects operates on behalf of this company: Check-Legal. The website states that for 600 Armenian drams (about 130 rubles, almost the same as a Himera Search search), you can get a full report on a counterparty. And this is far from the only related project.

To be continued