Cyber Security News

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus on Ukraine.

These groups employ bulletproof hosting services to mask their network infrastructure, enabling sophisticated campaigns involving financial theft, espionage, and psychological operations.

UAC-0050, linked to Russian law enforcement agencies, has transitioned to deploying NetSupport Manager malware this year, while UAC-0006 continues using SmokeLoader malware for phishing attacks.

Infrastructure Manipulation via Bulletproof Hosting

Both groups rely heavily on bulletproof hosting providers to evade detection and legal accountability. Autonomous systems such as Global Connectivity Solutions LLP (AS215540) and Railnet LLC (AS214943) are central to their operations.

These networks are often fronted by shell companies registered in offshore jurisdictions like Seychelles and managed by entities with ties to cybercrime ecosystems.

For instance, Zservers a sanctioned Russian hosting provider has shifted its network prefixes to newly established autonomous systems in Russia and Seychelles to obscure its activities.

Global Connectivity Solutions LLP, a UK-based network, facilitates traffic for ransomware groups such as Black Basta and Cactus by routing through Stark Industries (AS44477), a known proxy for Russian cyberattacks.

Similarly, Railnet LLC operates under Virtualine Technologies, a Russia-based bulletproof hosting provider advertised on underground forums for illegal activities like phishing and spam campaigns.

Psychological Operations and Espionage

In addition to malware campaigns, UAC-0050 has conducted psychological operations targeting Ukrainian entities with bomb threats under the guise of the “Fire Cells Group.”

Content of the phishing email sent in October

These emails aim to destabilize critical infrastructure and spread fear among allies of Ukraine.

Investigations reveal the use of IPs from Aeza International Ltd (AS210644) and other networks linked to bulletproof hosting providers.

Content of the phishing email sent in November

Meanwhile, UAC-0006 focuses on financial theft through phishing emails targeting accountants in Ukraine’s banking sector.

Leveraging compromised Ukrainian proxies managed via SystemBC panels, the group has repeatedly shifted its infrastructure across networks like PSB Hosting Ltd (AS214927) and other offshore providers.

The use of shell companies such as LS Trading Partners Inc and Lupine Logistics Ltd highlights the intricate legal frameworks employed by these hosting providers.

These entities obscure ownership details while facilitating malicious activities. Zservers’ administrators have avoided arrest despite sanctions from the U.S., UK, and Australia, showcasing the difficulty in dismantling these networks.

The evolving tactics of UAC-0050 and UAC-0006 underscore the growing sophistication of cybercriminals leveraging bulletproof hosting solutions.

Their ability to adapt infrastructure across global networks poses significant challenges for cybersecurity efforts aimed at mitigating state-sponsored cyber threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Oracle Reports Data Breach, Initiates Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking its…

49 minutes ago

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server. Due to improper…

2 hours ago

New Android Spyware Tricks Users by Demanding Passwords for Uninstallation

A newly identified Android spyware app is elevating its tactics to remain hidden and unremovable…

2 hours ago

Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats

Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for…

2 hours ago

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands accused…

5 hours ago

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module.…

5 hours ago