US sanctions LockBit ransomwares bulletproof hosting provider

pRansomware gang encrypted network from a webcam to bypass EDRppMicrosoft North Korean hackers join Qilin ransomware gangppOver 37000 VMware ESXi servers vulnerable to ongoing attacksppMicrosoft says malvertising campaign impacted 1 million PCsppUS cities warn of wave of unpaid parking phishing textsppNew Chirp tool uses audio tones to transfer data between devicesppStudy for your CISSP certifications in this 30 course bundle dealppDeveloper guilty of using kill switch to sabotage employers systemsppHow to access the Dark Web using the Tor BrowserppHow to enable Kernelmode Hardwareenforced Stack Protection in Windows 11ppHow to use the Windows Registry EditorppHow to backup and restore the Windows RegistryppHow to start Windows in Safe ModeppHow to remove a Trojan Virus Worm or other MalwareppHow to show hidden files in Windows 7ppHow to see hidden files in WindowsppRemove the Theonlinesearchcom Search RedirectppRemove the Smartwebfindercom Search RedirectppHow to remove the PBlock adware browser extensionppRemove the Toksearchesxyz Search RedirectppRemove Security Tool and SecurityTool Uninstall GuideppHow to Remove WinFixer Virtumonde Msevents TrojanvundoppHow to remove Antivirus 2009 Uninstall InstructionsppHow to remove Google Redirects or the TDSS TDL3 or Alureon rootkit using TDSSKillerppLocky Ransomware Information Help Guide and FAQppCryptoLocker Ransomware Information Guide and FAQppCryptorBit and HowDecrypt Information Guide and FAQppCryptoDefense and HowDecrypt Ransomware Information Guide and FAQppQualys BrowserCheckppSTOPDecrypterppAuroraDecrypterppFilesLockerDecrypterppAdwCleanerppComboFixppRKillppJunkware Removal ToolppeLearningppIT Certification CoursesppGear GadgetsppSecurityppBest VPNsppHow to change IP addressppAccess the dark web safelyppBest VPN for YouTubeppppThe United States Australia and the United Kingdom have sanctioned Zservers a Russiabased bulletproof hosting BPH services provider for supplying essential attack infrastructure for the LockBit ransomware gangppTwo of its key administrators Russian nationals Alexander Igorevich Mishin and Aleksandr Sergeyevich Bolshakov were also designated for their roles in directing Lockbit virtual currency transactions and supporting the gangs attacksppThe US Office of Foreign Assets Control OFAC says Canadian authorities discovered a laptop running a virtual machine linked to a Zservers subleased IP address and operating a LockBit malware control panel during a 2022 raid on a known LockBit affiliateppIn 2022 a Russian hacker acquired IP addresses from Zservers which were likely used with LockBit chat servers to coordinate ransomware activities while in 2023 Zservers provided infrastructure including a Russian IP address to a LockBit affiliateppRansomware actors and other cybercriminals rely on thirdparty network service providers like Zservers to enable their attacks on US and international critical infrastructure said Bradley T Smith Acting Under Secretary of the Treasury for Terrorism and Financial IntelligenceppCalling these hosting providers bulletproof is a false marketing gimmick Cybercriminals think they are safeguarded by these service providers however one massive swing from authorities can crack open and disrupt the infrastructure added Australian Federal Police Assistant Commissioner Richard ChinppBPH providers like ZSERVERS protect and enable cybercriminals offering a range of purchasable tools which mask their locations identities and activities Targeting these providers can disrupt hundreds or thousands of criminals simultaneously the UK government statedppBritains Foreign Commonwealth and Development Office has also sanctioned XHOST Internet Solutions LP Zservers UK front company and four employeesIlya Sidorov Dmitriy Bolshakov Igor Odintsov and Vladimir Ananevfor supporting LockBit ransomware attacksppFollowing these sanctions organizations and citizens of the three countries are prohibited from conducting transactions with the designated individuals and companies All assets linked to them will also be frozen and financial institutions and foreign entities involved in transactions with them may also face penaltiesppTodays sanctions follow a State Department reward offer of up to 10 million for LockBit ransomware admin Dmitry Khoroshev and rewards of up to 15 million for LockBit ransomware owners operators administrators and affiliatesppIn December the US Justice Department also charged a RussianIsraeli dualnational suspected of developing malware and managing the infrastructure for LockBit ransomwareppPrevious charges and arrests of cybercriminals linked to Lockbit ransomware include Mikhail Pavlovich Matveev aka Wazawaka in May 2023 Artur Sungatov and Ivan Gennadievich Kondratiev aka Bassterlord in February 2024 and Dmitry Yuryevich Khoroshev aka LockBitSupp and putinkrab in May 2024ppIn July Russian nationals Ruslan Magomedovich Astamirov and CanadianRussian national Mikhail Vasiliev also admitted to participating in at least a dozen ransomware attacks as LockBit affiliatesppThe US Department of Justice and the UK National Crime Agency estimate that LockBit has extorted up to 1 billion after over 7000 attacks between June 2022 and February 2024ppLockBit surfaced five years ago in September 2019 and has since claimed and has been linked to attacks targeting many highprofile entities worldwide including Bank of America Boeing the Continental automotive giant the UK Royal Mail and the Italian Internal Revenue ServiceppIn February 2024 Operation Cronos shut down LockBits infrastructure and seized 34 servers that contained over 2500 decryption keys later used to create a free LockBit 30 Black Ransomware decryptorppDiscover the Top 10 MITRE ATTCK techniques behind 93 of attacks and learn how to defend against themppDutch Police seizes 127 XHost servers dismantles bulletproof hosterppUS charges Garantex admins with money laundering sanctions violationsppUS charges Chinese hackers linked to critical infrastructure breachesppCyber agencies share security guidance for network edge devicesppRansomware attack disrupts New York blood donation giantppNot a member yet Register NowppUndocumented commands found in Bluetooth chip used by a billion devicesppDeveloper guilty of using kill switch to sabotage employers systemsppData breach at Japanese telecom giant NTT hits 18000 companiesppThe vCISO Academy Transforming MSPs and MSSPs into Cybersecurity PowerhousesppOverdue a password healthcheck Audit your Active Directory for freeppIntegrating LLMs into security operations using Wazuh Learn how to get startedppSharpRhino resurfaces How this malware evades detection See how it workspp5 Browser Security Threats Overlooked by Security Tools Get the Free ReportppTerms of Use Privacy Policy Ethics Statement Affiliate DisclosureppCopyright 2003 2025 Bleeping Computer LLC All Rights ReservedppNot a member yet Register NowppRead our posting guidelinese to learn what content is prohibitedp