Friday, March 28, 2025
HomeCyber AttackAuthorities Taken Down Bulletproof Hosting Provider Lolek

Authorities Taken Down Bulletproof Hosting Provider Lolek

Published on

SIEM as a Service

Follow Us on Google News

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and Poland to limit fraudsters’ access to tools that enable anonymous online behavior.

These platforms give hackers anonymity and are frequently used for malicious activities like malware distribution and assisting cyberattacks.

The FBI and IRS displayed a banner on the <Lolek>Hosted website as early as Tuesday.

“This domain has been seized by the Federal Bureau of Investigation and Internal Revenue Service – Criminal Investigation as part of a coordinated law enforcement action taken against Lolek Hosted,” the banner said.

Lolek Hosted website displayed the Banner

Since 2009, Hosted is a well-known bulletproof hosting service with headquarters in the UK and a data center in Europe. The website is frequently mentioned in stories regarding anonymous hosting services.

While promising to secure their clients’ identities, bulletproof hosting providers turn a blind eye to the content that users publish. 

These businesses are notorious for renting out IP addresses, servers, and domains to criminals who use them to spread malware, build up botnet armies, and do other activities connected to fraud and cyberattacks.

Document
FREE Webinar

API Security Fundamentals: How to Discover, Scan and Protect APIs

API Attacks Have Increased by 400% – Understand the Fundamentals of Protecting Your APIs with a Positive Security Model – Register Now for a Free Webinar

Sentencing Individuals Involved in Bulletproof Hosting Service

U.S. law enforcement has made a point of going after the operators of bulletproof hosting firms in recent years, bringing individuals responsible and imposing severe penalties.

The United States Department of Justice sentenced Mihai Ionut Paunescu, 39, to three years in federal prison in June for his assistance in managing the bulletproof hosting company PowerHost[.]ro.

Pavel Stassi, 30, of Estonia, and Aleksandr Shorodumov, 33, of Lithuania were both sentenced to more than two years in prison for running a bulletproof hosting company that assisted in launching attacks against U.S. targets between 2009 and 2015. 

Aleksandr Grichishkin, a Russian national, received a five-year sentence in 2021 for founding and running a bulletproof hosting business.

A 33-year-old resident of Illinois was also given a prison term for owning and running the DDoS facilitation websites DownThem.org and AmpNode.com, which also offered users bulletproof server hosting.

Hence, reports say authorities from the US and Poland worked together to seize Lolek Hosted. 

This confiscation is a result of US authorities’ aggressive efforts over the past few years to stop the operations of bulletproof hosting services, which have been mostly successful, with major successes including jail terms for important operators of these platforms.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...