Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine

Posted on January 15, 2026January 15, 2026 By CWS

A joint operation led by Microsoft and worldwide legislation enforcement has dismantled a enterprise electronic mail compromise (BEC) assault chain powered by the RedVDS fraud engine.

RedVDS operated as a low‑price “cybercrime subscription” platform, giving criminals disposable digital machines that appeared like regular Home windows programs on the web.

Utilizing these rented hosts, risk actors despatched enormous waves of phishing emails, hosted pretend portals, and staged cost diversion schemes towards corporations in finance, actual property, healthcare, and manufacturing.

The assault chain was easy however very efficient. Criminals first used RedVDS digital machines to ship focused phishing emails that harvested credentials from Microsoft 365 and different mail platforms.

As soon as they gained mailbox entry, they quietly watched actual threads between distributors, shoppers, and inside groups, ready for invoices, wire transfers, or closing directions.

On the proper second, they injected pretend replies with new financial institution particulars, routing massive funds to accounts they managed.

Microsoft analysts recognized that RedVDS amplified this fraud by combining excessive‑quantity infrastructure with AI instruments that generated convincing electronic mail textual content, pretend voice messages, and even deepfake movies.

On peak days, greater than 2,600 RedVDS digital machines despatched round a million phishing messages to Microsoft clients alone, serving to criminals compromise or abuse entry to over 191,000 organizations worldwide.

RedVDS’s person dashboard (Supply – Microsoft)

The coordinated takedown seized RedVDS domains, disrupted its cost channels, and eliminated a core pillar of this fraud ecosystem.

Investigators additionally tracked RedVDS use in actual property cost diversion, the place hijacked mailboxes for brokers and title companies had been used to ship pretend closing directions.

BEC assault chain powered by RedVDS (Supply – Microsoft)

In lots of instances, victims wired their life financial savings to mule accounts inside minutes of receiving the spoofed message.

How the RedVDS BEC Chain Operated

At a technical degree, the BEC chain adopted a repeatable script. Menace actors created or rented a RedVDS occasion, deployed primary tooling, and pivoted into reside mailboxes utilizing stolen credentials.

Microsoft’s authorized actions are bolstered by shut collaboration with legislation enforcement companions all over the world (Supply – Microsoft)

A standard sample concerned scripted login checks and inbox scans:-

for person in target_users:
if login(person.electronic mail, person.passwd, proxy=redvds_host):
for msg in inbox.search(“bill OR cost OR wire”):
if “upcoming” in msg.physique.decrease():
mark_as_watchlist(msg.thread_id)

As soon as a cost thread was flagged, the actor crafted a reply from the compromised account, usually reusing actual signatures and footers:-

fake_reply = build_reply(original_thread,
physique=new_bank_instructions,
from_account=compromised_mailbox)
ship(fake_reply, through=redvds_host)

Microsoft researchers famous that this structured playbook, mixed with disposable RedVDS nodes, made the fraud straightforward to scale and laborious to hint.

The latest operation exhibits that concentrating on shared crime infrastructure, not simply single accounts, is essential to shrinking the worldwide BEC assault floor.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Authorities, BEC, Chain, Dismatles, Engine, Fraud, Microsoft, Powered, RedVDS

Post navigation

Previous Post: 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
Next Post: Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Related Posts

Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds Cyber Security News
Top 50 Best Penetration Testing Companies Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
Google Patches Android 0-Day Vulnerabilities Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Depthfirst Raises $40 Million for Vulnerability Management
  • MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild
  • isVerified Emerges From Stealth With Voice Deepfake Detection Apps
  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Depthfirst Raises $40 Million for Vulnerability Management
  • MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild
  • isVerified Emerges From Stealth With Voice Deepfake Detection Apps
  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark