Cyber Security News

Threat Actor Leaks Data from Major Bulletproof Hosting Provider Medialand

A threat actor disclosed internal data from Medialand, a prominent bulletproof hosting (BPH) provider long associated with Yalishanda, a cybercriminal organization tracked as LARVA-34.

The breach has exposed the backend systems and operational infrastructure of Medialand, which has historically facilitated a wide array of illicit cyber activities, including ransomware operations, malware control-and-command systems, phishing campaigns, and other cybercrime-enabling tools and services.

Scope of the Leak

The leaked data reportedly covers Medialand’s infrastructure activity through February 2025, revealing the inner workings of one of the most crucial technical enablers of global cybercrime.

Medialand’s hosting services, widely regarded as “bulletproof” for their ability to shield clients from takedown attempts, were used to support infrastructure for malicious activities such as malware command-and-control (C2) servers, code-signing systems, phishing kits, data exfiltration panels, ransomware platforms (including BlackBasta), data leak sites, and other criminal endeavors.

a core BPH linked to Yalishanda (LARVA-34)

The leak also includes detailed records of server purchases and payments, including transactions processed via cryptocurrencies.

Early analysis suggests that personally identifiable information (PII) of clients, including cybercriminal operators, may be included within the exposed data.

Such revelations could pave the way for de-anonymizing key figures within the cybercrime ecosystem, potentially disrupting operations and aiding law enforcement investigations.

Timeline of Events

Signs of the impending data breach first emerged on February 23, 2025, when the threat actor created a Telegram channel.

This move was likely preparatory, serving as a platform for publishing the leak.

By March 14, 2025, Yalishanda made an announcement on a well-known underground forum, indicating heightened activity among affiliates.

Finally, on March 28, 2025, the leak was made public, providing extensive documentation on Medialand’s backend systems, customer transactions, and infrastructure details.

The leak is regarded as a rare and high-value source of intelligence for cybersecurity researchers, analysts, and law enforcement agencies.

According to the Report, By providing details on server ownership, financial transactions, and infrastructure patterns, the exposed data offers a unique opportunity to correlate indicators of compromise (IOCs) and link cybercrime campaigns to specific threat actors.

Furthermore, this information could support attribution efforts, facilitating the clustering of related operations under the banners of distinct criminal groups.

Notably, Medialand’s infrastructure has been tied to ransomware operations, with BlackBasta an active ransomware group being one of its users.

The breach coincides with other leaks targeting ransomware operators, such as the February 11, 2025, BlackBasta data dump.

Researchers are closely examining the relationship between these leaks, suspecting involvement from the same actors or groups behind them.

The exposure of Medialand’s backend systems could significantly undermine the operational security of these ransomware campaigns.

On a broader scale, the leak serves as a major setback for cybercriminal operations reliant on bulletproof hosting services.

The fallout could complicate efforts to maintain anonymity, organize large-scale campaigns, and evade detection.

It also provides the cybersecurity community with an unprecedented level of visibility into critical infrastructure powering cybercrime.

The Medialand leak underscores the vulnerability of cybercrime-enabling platforms despite their reputation for resilience.

For threat intelligence practitioners, the exposed data represents a breakthrough opportunity to dissect malicious infrastructure, trace financial flows, and attribute campaign clusters.

For cybercriminals reliant on bulletproof hosting providers, however, the breach marks a significant blow, potentially exposing their identities and disrupting their operations.

As investigations continue into the leaked data and its implications, one thing is clear: the incident is likely to reshape the dynamics of cybercrime attribution and intervention in the months ahead.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a…

9 hours ago

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked…

9 hours ago

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise…

9 hours ago

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes…

9 hours ago

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative…

9 hours ago

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy…

9 hours ago