Friday, February 21, 2025
HomeCyber Security NewsDutch Authorities Dismantle Network of 127 Command-and-Control Servers

Dutch Authorities Dismantle Network of 127 Command-and-Control Servers

Published on

SIEM as a Service

Follow Us on Google News

Dutch police and the Public Prosecution Service have taken down a network of 127 command-and-control servers.

This network was operated by ZServers/XHost, a so-called bulletproof hosting provider offering cybercriminals a safe haven to facilitate illegal activities, such as spreading malware and carrying out cyberattacks.

A bulletproof hoster is a hosting company that protects criminals by renting out servers with guarantees of anonymity and safeguards against law enforcement.

Such services are a critical infrastructure for cybercriminals, allowing them to host hacking tools, ransomware, botnets, and other malicious software.

Think of it as a secret hideout for stolen goods, where the owner denies any knowledge of illegal activities.

Online, a bulletproof hoster provides the same kind of safe haven, but with a much larger global impact.

The Investigation Into ZServers/XHost

The investigation into ZServers/XHost began a year ago after the company advertised services that explicitly facilitated criminal activities.

Customers could access fully anonymous hosting options and make payments via cryptocurrency with the promise that no information would be shared with authorities. This raised red flags with the Cybercrime Team Amsterdam.

During the raid, investigators uncovered hacking tools from infamous ransomware groups like Conti and Lockbit, which have caused significant damage worldwide. Although no arrests have been made yet, further analysis of the seized data is ongoing.

Without bulletproof hosters, much of global cybercrime would not be possible. These companies provide criminals with an uninterrupted platform to manage hacking tools, stolen data, and phishing websites.

The Netherlands, with its advanced digital infrastructure, is often exploited for such activities, highlighting the urgent need for stricter regulations, such as a know-your-customer (KYC) policy.

The dismantling of this network marks a major victory in the fight against cybercrime. By taking down one of the shadowy hubs of the digital underworld, Dutch authorities have sent a strong message.

However, the need for international cooperation and stricter legislation remains critical to combat this complex and borderless threat effectively.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...