Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Authorities Sanctioned Russia-based Bulletproof Hosting Provider for Supporting Ransomware Operations

Posted on November 21, 2025November 21, 2025 By CWS

The U.S. Division of the Treasury, Australia, and the UK have introduced coordinated sanctions in opposition to Media Land.

This Russia-based bulletproof internet hosting firm offers infrastructure to ransomware and different cybercriminals.

The U.S. Federal Bureau of Investigation additionally coordinated the motion focusing on the corporate’s management workforce and associated entities.

Bulletproof internet hosting suppliers supply specialised servers designed to assist criminals cover their actions and keep away from legislation enforcement.

These companies give ransomware gangs, hackers, and different cybercriminals the infrastructure they should launch assaults in opposition to companies and demanding infrastructure.

Media Land, headquartered in St. Petersburg, Russia, equipped internet hosting companies to main ransomware teams, together with LockBit, BlackSuit, and Play.

The corporate’s infrastructure was additionally used for distributed denial-of-service (DDoS assaults focusing on U.S. corporations and demanding methods. Firm management performed direct roles within the felony operation.

Aleksandr Volosovik, Media Land’s basic director, marketed the corporate’s companies on cybercriminal boards underneath the alias “Yalishanda” and offered servers to ransomware actors.

Kirill Zatolokin, an worker, collected funds from clients and coordinated with different cyber actors. Yulia Pankova assisted Volosovik with authorized issues and monetary administration.

The Treasury additionally designated Hypercore Ltd., a UK-registered firm created by the Aeza Group after it was sanctioned in July 2025. Aeza tried to rebrand and conceal its connections to keep away from sanctions.

Treasury officers designated new corporations and people concerned within the evasion effort, together with administrators Maksim Makarov and Ilya Zakirov. Associated entities in Serbia and Uzbekistan had been additionally focused.

All property and property belonging to the designated people and corporations in the US are actually frozen.

U.S. individuals and companies are prohibited from conducting transactions with these entities. Monetary establishments participating with sanctioned events danger enforcement actions.

The U.S. Treasury emphasised that these coordinated worldwide actions reveal a dedication to stopping ransomware and defending residents from cybercrime.

The Cybersecurity and Infrastructure Safety Company launched extra steerage on defending in opposition to bulletproof internet hosting suppliers.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Authorities, Bulletproof, Hosting, Operations, Provider, Ransomware, Russiabased, Sanctioned, Supporting

Post navigation

Previous Post: Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Next Post: OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently

Related Posts

Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Cyber Security News
NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim Cyber Security News
Android Spyware Catwatchful Exposes Credentials of Over 62,000+ Customer Accounts Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads Cyber Security News
Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark