Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns

Posted on July 31, 2025July 31, 2025 By CWS

A classy bulletproof internet hosting operation has emerged as a vital enabler of worldwide malware campaigns, with cybersecurity researchers uncovering intensive proof linking UK-registered firm Qwins Ltd to widespread cybercriminal actions.

The corporate, working underneath Autonomous System Quantity (ASN) 213702, has been recognized because the infrastructure spine supporting a number of high-profile malware households together with Lumma Stealer, Amadey Botnet, and Mirai variants.

Current evaluation of over 100 Lumma Stealer samples revealed that menace actors are leveraging Qwins Ltd’s internet hosting companies to orchestrate coordinated assaults throughout a number of vectors.

The investigation, spanning July 15-22, 2025, recognized 292 speaking IP addresses related to malicious actions, with the corporate’s infrastructure serving as each command-and-control facilities and payload distribution hubs.

Working from server areas throughout Russia, Germany, Finland, Netherlands, and Estonia, Qwins Ltd provides digital non-public servers and devoted internet hosting at remarkably low costs beginning round $2 per thirty days, making it a sexy choice for cybercriminals looking for cost-effective infrastructure.

Servers deployment (Supply – Cyber Intelligence Insights)

The corporate’s company construction raises further purple flags, having been included on November 11, 2024, in the UK underneath the directorship of Kristina Konstantinova.

Notably, Konstantinova served as performing director for precisely six months earlier than the corporate underwent a strategic rebranding in April 2025, changing into “High quality IT Community Options Restricted.” This timeline coincides with elevated malicious exercise throughout the supplier’s community infrastructure.

Cyber Intelligence Insights researchers recognized a disturbing sample of abuse throughout Qwins Ltd’s community segments, with proof pointing to systematic exploitation by a number of menace actor teams.

The investigation revealed that the internet hosting supplier’s roughly 2,300 hosts are being utilized for numerous malicious functions, from internet hosting phishing web sites impersonating official monetary companies like Brex to distributing subtle malware payloads concentrating on each Home windows and Linux architectures.

Evaluation of the community’s malicious infrastructure reveals a classy operational construction designed to maximise assault effectiveness whereas minimizing detection.

The first malicious actions are concentrated throughout 4 distinct community segments, every serving specialised capabilities within the broader cybercriminal ecosystem.

Community Segmentation and Assault Infrastructure

Probably the most important revelation from the evaluation entails the systematic segmentation of malicious actions throughout Qwins Ltd’s community infrastructure.

The 93.123.39.0/24 community phase capabilities as the first DDoS and botnet command middle, internet hosting 39 malicious IP addresses that distribute over 120 totally different malware payloads.

ASN & Ports Pivot (Supply – Cyber Intelligence Insights)

This community primarily operates botnet infrastructure speaking by port 666, facilitating large-scale distributed denial-of-service assaults and sustaining persistent entry to compromised programs.

The 141.98.6.0/24 phase serves as the data stealer hub, with 15 flagged IP addresses internet hosting roughly 45 malware samples.

This community makes a speciality of deploying infostealers like Amadey, Lumma, and Vidar, concentrating on delicate consumer credentials and monetary data.

Key IP handle 141.98.6.34 has been notably energetic, internet hosting phishing websites and serving as a communication endpoint for a number of malware households.

Assault circulation (Supply – Cyber Intelligence Insights)

Supporting the assault chain, the 95.164.53.0/24 community capabilities because the preliminary an infection vector, distributing document-based droppers together with malicious PDF, DOC, and ZIP recordsdata.

These payloads function entry factors for an infection chains, subsequently directing victims to obtain further malware elements from different community segments.

The 77.105.164.0/24 phase completes the infrastructure by offering command-and-control companies, configuration internet hosting, and information exfiltration capabilities, guaranteeing persistent communication between contaminated programs and menace actor infrastructure.

This systematic strategy to community utilization demonstrates the delicate nature of contemporary bulletproof internet hosting operations and their vital position in enabling large-scale cybercriminal campaigns throughout a number of malware households and assault vectors.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Bulletproof, Campaigns, Fueling, Global, Hosting, Malware, Provider, Qwins

Post navigation

Previous Post: How to Respond to a Sextortion Threat
Next Post: AI Vibe Coding Platform Hacked

Related Posts

Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News
First Rowhammer Attack Targeting NVIDIA GPUs Cyber Security News
US Sanction Key Threat Actors Linked With North Korea’s Remote IT Worker Scheme Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
  • Noma Security Raises $100 Million for AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
  • Noma Security Raises $100 Million for AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News