Wednesday, March 26, 2025
HomeCyber AttackAuthorities Taken Down Bulletproof Hosting Provider Lolek

Authorities Taken Down Bulletproof Hosting Provider Lolek

Published on

SIEM as a Service

Follow Us on Google News

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and Poland to limit fraudsters’ access to tools that enable anonymous online behavior.

These platforms give hackers anonymity and are frequently used for malicious activities like malware distribution and assisting cyberattacks.

The FBI and IRS displayed a banner on the <Lolek>Hosted website as early as Tuesday.

“This domain has been seized by the Federal Bureau of Investigation and Internal Revenue Service – Criminal Investigation as part of a coordinated law enforcement action taken against Lolek Hosted,” the banner said.

Lolek Hosted website displayed the Banner

Since 2009, Hosted is a well-known bulletproof hosting service with headquarters in the UK and a data center in Europe. The website is frequently mentioned in stories regarding anonymous hosting services.

While promising to secure their clients’ identities, bulletproof hosting providers turn a blind eye to the content that users publish. 

These businesses are notorious for renting out IP addresses, servers, and domains to criminals who use them to spread malware, build up botnet armies, and do other activities connected to fraud and cyberattacks.

Document
FREE Webinar

API Security Fundamentals: How to Discover, Scan and Protect APIs

API Attacks Have Increased by 400% – Understand the Fundamentals of Protecting Your APIs with a Positive Security Model – Register Now for a Free Webinar

Sentencing Individuals Involved in Bulletproof Hosting Service

U.S. law enforcement has made a point of going after the operators of bulletproof hosting firms in recent years, bringing individuals responsible and imposing severe penalties.

The United States Department of Justice sentenced Mihai Ionut Paunescu, 39, to three years in federal prison in June for his assistance in managing the bulletproof hosting company PowerHost[.]ro.

Pavel Stassi, 30, of Estonia, and Aleksandr Shorodumov, 33, of Lithuania were both sentenced to more than two years in prison for running a bulletproof hosting company that assisted in launching attacks against U.S. targets between 2009 and 2015. 

Aleksandr Grichishkin, a Russian national, received a five-year sentence in 2021 for founding and running a bulletproof hosting business.

A 33-year-old resident of Illinois was also given a prison term for owning and running the DDoS facilitation websites DownThem.org and AmpNode.com, which also offered users bulletproof server hosting.

Hence, reports say authorities from the US and Poland worked together to seize Lolek Hosted. 

This confiscation is a result of US authorities’ aggressive efforts over the past few years to stop the operations of bulletproof hosting services, which have been mostly successful, with major successes including jail terms for important operators of these platforms.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows...

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%

The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows...

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...