Wednesday, July 24, 2024
EHA

Authorities Taken Down Bulletproof Hosting Provider Lolek

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and Poland to limit fraudsters’ access to tools that enable anonymous online behavior.

These platforms give hackers anonymity and are frequently used for malicious activities like malware distribution and assisting cyberattacks.

The FBI and IRS displayed a banner on the <Lolek>Hosted website as early as Tuesday.

“This domain has been seized by the Federal Bureau of Investigation and Internal Revenue Service – Criminal Investigation as part of a coordinated law enforcement action taken against Lolek Hosted,” the banner said.

Lolek Hosted website displayed the Banner

Since 2009, Hosted is a well-known bulletproof hosting service with headquarters in the UK and a data center in Europe. The website is frequently mentioned in stories regarding anonymous hosting services.

While promising to secure their clients’ identities, bulletproof hosting providers turn a blind eye to the content that users publish. 

These businesses are notorious for renting out IP addresses, servers, and domains to criminals who use them to spread malware, build up botnet armies, and do other activities connected to fraud and cyberattacks.

Document
FREE Webinar

API Security Fundamentals: How to Discover, Scan and Protect APIs

API Attacks Have Increased by 400% – Understand the Fundamentals of Protecting Your APIs with a Positive Security Model – Register Now for a Free Webinar

Sentencing Individuals Involved in Bulletproof Hosting Service

U.S. law enforcement has made a point of going after the operators of bulletproof hosting firms in recent years, bringing individuals responsible and imposing severe penalties.

The United States Department of Justice sentenced Mihai Ionut Paunescu, 39, to three years in federal prison in June for his assistance in managing the bulletproof hosting company PowerHost[.]ro.

Pavel Stassi, 30, of Estonia, and Aleksandr Shorodumov, 33, of Lithuania were both sentenced to more than two years in prison for running a bulletproof hosting company that assisted in launching attacks against U.S. targets between 2009 and 2015. 

Aleksandr Grichishkin, a Russian national, received a five-year sentence in 2021 for founding and running a bulletproof hosting business.

A 33-year-old resident of Illinois was also given a prison term for owning and running the DDoS facilitation websites DownThem.org and AmpNode.com, which also offered users bulletproof server hosting.

Hence, reports say authorities from the US and Poland worked together to seize Lolek Hosted. 

This confiscation is a result of US authorities’ aggressive efforts over the past few years to stop the operations of bulletproof hosting services, which have been mostly successful, with major successes including jail terms for important operators of these platforms.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.

Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles