Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A critical Cisco vulnerability in unified CM grants root access through static credentials

Openai blames Robinhood’s “Openai Tokens”

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian bulletproof hosting provider to support cybercriminals behind US sanctions ransomware
Identity

Russian bulletproof hosting provider to support cybercriminals behind US sanctions ransomware

userBy userJuly 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 2, 2025Ravi LakshmananCybercrime/Dark Web

Bulletproof Hosting in Russia

The US Treasury Department’s Office of Foreign Assets Control (OFAC) imposes sanctions against the AEZA Group, a Russian-based bulletproof hosting (BPH) service provider, helping to target threat activities and victims from around the country and around the world.

The sanctions are also extended to subsidiary AEZA International Ltd., the UK branch of AEZA Group, and to four individuals linked to AEZA Logistic LLC, Cloud Solutions LLC, and the company.

ARSENII ALEKSANDROVICH PENZEV is the CEO, 33% owner and general director of AEZA group Yurii Meruzhanovich Bozoyan, and the absence of technical directors Penzev and Bozoyan Anatolyevich Knyazev, who are the CEO, 33% owner of Aeza group Vladimir Vyacheslavovich Gast, and the professional artisans of Penzev and Bozoyan Igor Anatolyevich knyazev

Cybersecurity

It is worth noting that Penzev was arrested in early April 2025 on charges that allowed large-scale drug trafficking by leading a criminal organization and hosting BlackSprut, an illegal drug market on the dark web. Bozoyan and two other Aeza employees, Maxim Orel and Tatyana Zubova, were also taken into custody.

“Cybercriminals continue to rely heavily on BPH service providers like the AEZA group, promoting destructive ransomware attacks, stealing US technology and selling black market drugs,” says Bradley T. Smith, Action and Financial Information under Terrorism Secretary.

“The Treasury remains determined to work closely with the UK and other international partners to expose the key nodes, infrastructure and individuals that support this criminal ecosystem.”

BPH Services has been a gods blessing for threat actors as they are known to deliberately ignore abuse reports and law enforcement requests. This makes an attacker a resilient option for hosting malicious infrastructure, such as phishing sites, command and control (C2) servers.

The St. Petersburg-based Aeza Group has been accused of leasing services to a variety of ransomware and information steelers families, including Baianlian, Redline, Meduza and Lumma.

Additionally, a report released last July by Recreciv and Quarium detailed the use of Aeza’s infrastructure through a pro-Russian influence operation called Doppelganger. Another threat actor who used Aeza’s services is Void Rabisu, a Russian-lined threat actor behind Romcom Rat.

Cybersecurity

The development comes nearly five months after authorizing another Russian-based BPH service provider named Zservers to promote ransomware attacks, such as those coordinated by the Lockbit Group.

Last week, Qurium linked Russian web hosting and proxy providers to a proxy provider named Biterika to a distributed denial (DDOS) attack on two independent Russian media outlets and Verstka.

These sanctions form part of a broader effort to dismantle the ransomware supply chain by targeting critical enablers such as malicious hosting, command and control servers, and dark web infrastructure. As threat actors change their tactics, surveillance of authorized entities, IP reputation scores, and abuse-oriented networks is becoming central to modern threat intelligence practices.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSellafield Laptop Recycling Scheme Bridge Digital Difference
Next Article How energy storage redefines European electricity ecosystems
user
  • Website

Related Posts

A critical Cisco vulnerability in unified CM grants root access through static credentials

July 3, 2025

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

July 2, 2025

Northorean Hackers Target Web3 with NIM malware and use Clickfix in Babyshark campaign

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A critical Cisco vulnerability in unified CM grants root access through static credentials

Openai blames Robinhood’s “Openai Tokens”

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Could Google’s VEO3 be the beginning of a playable world model?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.