Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Hackers abuse Russian bulletproof host Proton66 for global attacks and malware delivery
Identity

Hackers abuse Russian bulletproof host Proton66 for global attacks and malware delivery

userBy userApril 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 21, 2025Ravi LakshmananVulnerability/Threat Intelligence

Russian bulletproof host Proton66

Cybersecurity researchers have revealed a surge in “mass scans, brute-enabled qualifications and attempts to exploit” derived from an IP address associated with a Russian bulletproof hosting service provider named Proton 66.

According to a two-part analysis published by TrustWave SpiderLabs, this activity detected since January 8, 2025 is targeted at organizations around the world.

“Netblocks 45.135.232.0/24 and 45.140.17.0/24 were particularly active in terms of mass scans and brute force attempts,” said security researchers Pawel Knapczyk and Dawid Nesterwicz. “Some of the problematic IP addresses were previously not seen as involved in malicious activities and were inactive for over two years.”

Proton 66 in the Russian autonomous system is rated as linked to another autonomous system named Prospero. Last year, French security company Intrinsec detailed its relationship with SecureHost and bulletproof services sold at Russian Cybercrime Forum under the name Bearhost.

Cybersecurity

Several malware families, including Gootloader and Spynote, host command and control (C2) servers and phishing pages on Proton66. Earlier this February, security journalist Brian Krebs revealed that Prospero had begun to route operations through a network run by Moscow’s Russian anti-virus vendor Kaspersky Lab.

However, Kaspersky has denied that he is working with Prospero as Kaspersky’s automated system (AS) path may appear as a technical prefix because the company works and provides DDOS services and provides DDOS services, and that “routing through the network through a network operated by Kaspersky does not mean providing the company’s services.”

TrustWave’s latest analysis reveals a malicious request derived from one of the Proton66 netblocks (193.143.1[.]65) In February 2025, we tried to exploit some of the latest important vulnerabilities –

CVE-2025-0108-Palo Alto Networks Authentication Bypass Vulnerability Pan-OS Software CVE-2024-41713-Mytel Miko Love CVE-2024-10914’s Mytel Miko Love CVE-2024-10914’s Nupoint Unified Messaging (NPM) Component Insufficient Input Verification Vulnerability CVE-2025-24472-Fortinet Fortios Authentication Bypass Vulnerability

It is worth noting that the exploitation of the two Fortinet Fortios flaws is attributed to an early access broker called Mora_001. MORA_001 has been observed to offer a new ransomware strain called SuperBlack.

The cybersecurity company also observed several malware campaigns linked to Proton66, designed to distribute ransomware named Xworm, Strellastealer and Weaxor.

Another notable activity concerns the use of compromised WordPress websites related to Proton66-related IP addresses.[.]21″ Redirect Android device users to a phishing page that mimics a list of Google Play apps and tricks users into downloading malicious APK files.

Redirection is facilitated by malicious JavaScript hosted on a Proton66 IP address. Analyses of fake playstore domain names show that the campaign is designed to target speaking users in French, Spanish and Greek.

Cybersecurity

“The redirector script is obfuscated and performs several checks on the victim, including excluding crawlers and VPN or proxy users,” the researchers explained. “The user IP is retrieved through a query to ipify.org. The presence of the VPN in the proxy is then verified through subsequent queries to ipinfo.io. Ultimately, the redirection only occurs when an Android browser is found.”

Also hosted on one of the Proton66 IP addresses is a ZIP archive that leads to the deployment of XWorm malware, which selects Korean-speaking chat room users, particularly using social engineering schemes.

The first stage of an attack is the Windows Shortcut (LNK) that runs the PowerShell commands. This runs a visual basic script that downloads base64-encoded .NET DLLs from the same IP address. The DLL proceeds to download and loading the XWorm binaries.

The Proton66-linked infrastructure is also used to promote phishing email campaigns targeting German-speaking users with Strelasteler, an information steeler that communicates with IP addresses (193.143.1)[.]205) For C2.

Finally, I found out that the Weaxor ransomware artifact (revised version of Mallox) is contacting the C2 server on the Proton66 network (193.143.11[.]139″).

Organizations are advised to block all Classless Inter-Domain Routing (CIDR) ranges associated with Hong Kong-based providers Proton66 and Chang Way Technologies to neutralize potential threats.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleInvesting in ocean innovation for a better world
Next Article ATLAS Collaboration unveils secrets of the Higgs Boson
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

What is Zero Waste? FySelf Unveils the Eco-Friendly Lifestyle Revolution

Guardiola will receive another honor in Manchester. This is from that university

Republican proposal supported by Trump floats $1,000 baby bonds for families

Apple redesigns its operating system with “LiquidGlass” on WWDC 25

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

IONQ acquires nearly $1.1 billion in British quantum startup Oxford Ionics

aixuspeed reports $500,000 in token commitments within the first 72 hours prior to sale

Vantage raises 720 million euros in the first ever euro ABS transaction backed by European data centres

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.