Tuesday, February 25, 2025
HomeSecurity NewsLaw Enforcement Agencies Shutdown a Marketplace that Renting out servers for Hackers

Law Enforcement Agencies Shutdown a Marketplace that Renting out servers for Hackers

Published on

SIEM as a Service

Follow Us on Google News

MaxiDed the marketplace that provides servers for child pornography sites, Command-and-control servers, sending spam messages and for DOS attacks was takedown in conjunction with joint operations from Royal Thai Police and Dutch National Police.

Police seized more than 10 servers from MaxiDed also known as bulletproof hosting company, according to the archived version of the website the company hosts nearly 2,500 servers at 30 hosting providers in 82 countries.

Over the years bulletproof hosting company preferred by the number of cybercrime group, it was used in Carbanak Hacker Group who attacks against various banks, financial institutions, the e-payment gateways. Also, their servers used in Mirai DDoS botnet and with a number of spam campaigns.

MaxiDed takedown

Thai police arrested 29-year-old Moldavian man in Thailand at a holiday resort, according to investigators he also owns file sharing service that shares child pornography.

The Bulgarian police arrested the second man a 37-year-old Moldavian who suppose to be server administrator of MaxiDed.

MaxiDed takedown

Dutch police said that the data seized from ten MaxiDed servers will be handed over to Europol, so it can be distributed to other foreign law enforcement agencies.

Now the company’s site has been redirected to the Dutch police with the notice

“The police investigation focuses on the criminal activities of MaxiDed and the people behind MaxiDed.
MaxiDed uses the Dutch (digital) infrastructure to provide services to criminals by renting out servers from which criminal activities can be deployed such as sending spam messages and causing DDOS attacks. The takedown of MaxiDed is a coordinated effort by law enforcement agencies from Thailand and The Netherlands.”
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...