Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

Posted on July 2, 2025July 2, 2025 By CWS

Jul 02, 2025Ravie LakshmananCybercrime / Darkish Internet
The U.S. Division of the Treasury’s Workplace of Overseas Belongings Management (OFAC) has levied sanctions towards Russia-based bulletproof internet hosting (BPH) service supplier Aeza Group to help menace actors of their malicious actions and focusing on victims within the nation and internationally.
The sanctions additionally prolong to its subsidiaries Aeza Worldwide Ltd., the U.Okay. department of Aeza Group, in addition to Aeza Logistic LLC, Cloud Options LLC, and 4 people linked to the corporate –

Arsenii Aleksandrovich Penzev, CEO and 33% proprietor of Aeza Group
Yurii Meruzhanovich Bozoyan, common director and 33% proprietor of Aeza Group
Vladimir Vyacheslavovich Gast, technical director who works intently with Penzev and Bozoyan
Igor Anatolyevich Knyazev, 33% proprietor of Aeza Group who manages the operations within the absence of Penzev and Bozoyan

It is value noting that Penzev was arrested in early April 2025 on prices of main a legal group and enabling large-scale drug trafficking by internet hosting BlackSprut, a bootleg medicine market on the darkish net. Bozoyan and two different Aeza staff, Maxim Orel and Tatyana Zubova, had been additionally detained.
“Cybercriminals proceed to rely closely on BPH service suppliers like Aeza Group to facilitate disruptive ransomware assaults, steal U.S. expertise, and promote black-market medicine,” stated Appearing Beneath Secretary of the Treasury for Terrorism and Monetary Intelligence Bradley T. Smith.
“Treasury, in shut coordination with the U.Okay. and our different worldwide companions, stays resolved to show the crucial nodes, infrastructure, and people that underpin this legal ecosystem.”
BPH companies have been godsend for menace actors as they’re recognized to intentionally ignore abuse reviews and regulation enforcement takedown requests, typically working in nations with weak enforcement or deliberately imprecise authorized requirements. This makes them a resilient possibility for attackers to host their malicious infrastructure, together with phishing websites and command-and-control (C2) servers, with out disruption or penalties.
Headquartered in St. Petersburg, Aeza Group is accused of leasing its companies to varied ransomware and knowledge stealer households, similar to BianLian, RedLine, Meduza, and Lumma, a few of which have been used to focus on U.S. protection industrial base and expertise corporations and different victims worldwide.
What’s extra, a report printed by Correctiv and Qurium final July detailed using Aeza’s infrastructure by the pro-Russian affect operation dubbed Doppelganger. One other menace actor that has availed the companies of Aeza is Void Rabisu, the Russia-aligned menace actor behind RomCom RAT.

The event comes practically 5 months after the Treasury sanctioned one other Russia-based BPH service supplier named Zservers for facilitating ransomware assaults, similar to these orchestrated by the LockBit group.
Final week, Qurium additionally linked a Russian hosting and proxy supplier named Biterika to distributed denial-of-service (DDoS) assaults towards two Russian impartial media retailers IStories and Verstka.These sanctions kind a part of a broader effort to dismantle the ransomware provide chain by focusing on crucial enablers like malicious internet hosting, C2 servers, and darkish net infrastructure. As menace actors shift techniques, monitoring sanctioned entities, IP popularity scores, and abuse-resilient networks is turning into central to trendy menace intelligence operations.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Bulletproof, Cybercriminals, Hosting, Provider, Ransomware, Russian, Sanctions, Supporting, U.S

Post navigation

Previous Post: CISA Warns of Two Exploited TeleMessage Vulnerabilities 
Next Post: Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover

Related Posts

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code The Hacker News
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine The Hacker News
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures The Hacker News
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
Chaos RaaS Emerges After BlackSuit Takedown, Demanding 0K from U.S. Victims Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark