Ilya Shatkhin — Cybersecurity Expert (MSc in Information Security)
I help individuals and businesses safely resolve online issues: account access recovery, protection of messengers and websites,
security audits and pentesting, handling digital blackmail (within the legal framework), and incident response.
I work legally, under contract, and with an NDA.
Important: I do not perform requests for hacking, bypassing protections, or access without the explicit permission of the owner.
In brief
- Format: remote or on-site (Israel), confidential, NDA if required.
- Outcome: a clear action plan + report/recommendations and verification of fixes.
- Priority: client security and evidentiary clarity (what happened, what was done, what changed).
Education and experience
- Master’s degree in Information Security. Ben-Gurion University (Be’er Sheva, Israel).
- Practice and projects in Israel: web security, infrastructure hardening, account protection, incident response.
- I work with ecosystems and services of major platforms and corporate infrastructures.
I have also participated in projects and consultations in Israel involving teams/companies at the level of
Google, Microsoft, Apple, and NSO Group (details and roles are not disclosed due to NDA; for serious inquiries, I can confirm within permissible limits). - 10+ years of practice: account protection, investigations, web security, user training, anti-fraud.
How I work
- Assessment: what happened, what the risks are, what data/access you have.
- Rights verification: where required—confirm ownership/permission and agree on the scope of work.
- Actions: I perform only agreed steps, with no “gray” methods.
- Report: what was done, what was found, remediation priorities and recommendations.
- Control: verification of fixes and preventive setup (2FA, backup codes, password policies, training).
References and experience confirmation
Public talks and interviews are listed below. Personal references and project confirmations are provided
upon request and with consent of the other party (or under NDA), to preserve client confidentiality.
Media / interviews
My position is simple: absolute security does not exist, but it can be made sufficient—
through discipline, proper configurations, and timely response.
How I help
Access recovery
Accounts, email, messengers, social networks — only with confirmed ownership.
Login review, session termination, 2FA and backup codes setup, backup restoration,
training on how to avoid repeat incidents.
Audit and pentest
Website and infrastructure testing with written authorization.
Deliverables include a report with priorities, clear remediation steps, and hardening recommendations.
No promises like “we’ll hack everything 100%” — only measurable risks and scoped work.
Incident response
Evidence preservation, recovery, root-cause elimination, and prevention.
Confidentiality and careful handling of evidence.
Removal of sensitive data
Legal requests, de-indexing, cleanup of leaked traces within the law.
No gray schemes and no “platform bypassing.”
Frequently asked questions
Can you “hack” someone else’s account?
No. I work only legally and only with confirmed ownership/authorization.
What is required to recover access?
It depends on the service. Typically—proof of ownership (receipts, correspondence, devices, backup codes, documents requested by the platform) and access to any remaining linked contacts.
Do you provide a pentest report?
Yes. The report includes identified risks, priorities, recommendations, and verification of fixes by agreement.
Can we work under an NDA?
Yes. For businesses, this is standard practice.
Contacts
Phone/WhatsApp: +7 996 251-36-72 ·
WhatsApp ·
Telegram: @hacker4u_ru ·
E-mail: info@haker4u.ru