Categories: Security News

Law Enforcement Agencies Shutdown a Marketplace that Renting out servers for Hackers

MaxiDed the marketplace that provides servers for child pornography sites, Command-and-control servers, sending spam messages and for DOS attacks was takedown in conjunction with joint operations from Royal Thai Police and Dutch National Police.

Police seized more than 10 servers from MaxiDed also known as bulletproof hosting company, according to the archived version of the website the company hosts nearly 2,500 servers at 30 hosting providers in 82 countries.

Over the years bulletproof hosting company preferred by the number of cybercrime group, it was used in Carbanak Hacker Group who attacks against various banks, financial institutions, the e-payment gateways. Also, their servers used in Mirai DDoS botnet and with a number of spam campaigns.

MaxiDed takedown

Thai police arrested 29-year-old Moldavian man in Thailand at a holiday resort, according to investigators he also owns file sharing service that shares child pornography.

The Bulgarian police arrested the second man a 37-year-old Moldavian who suppose to be server administrator of MaxiDed.

MaxiDed takedownMaxiDed takedown

Dutch police said that the data seized from ten MaxiDed servers will be handed over to Europol, so it can be distributed to other foreign law enforcement agencies.

Now the company’s site has been redirected to the Dutch police with the notice

“The police investigation focuses on the criminal activities of MaxiDed and the people behind MaxiDed.
MaxiDed uses the Dutch (digital) infrastructure to provide services to criminals by renting out servers from which criminal activities can be deployed such as sending spam messages and causing DDOS attacks. The takedown of MaxiDed is a coordinated effort by law enforcement agencies from Thailand and The Netherlands.”
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis…

1 hour ago

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging…

1 hour ago

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations' operations but introduces complex security challenges that demand proactive leadership…

7 hours ago

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major…

7 hours ago

Building a Security First Culture – Advice from Industry CISOs

In today’s threat landscape, cybersecurity is no longer confined to firewalls and encryption it’s a…

9 hours ago

Microsoft Prevents Billions of Dollars in Fraud and Scams

Microsoft has reported significant strides in thwarting financial fraud across its ecosystem. From April 2024…

9 hours ago