Dutch police say they took down 127 servers used by sanctioned hosting service

Avatar

Police in the Netherlands say they seized 127 servers this week that were used by Zservers, a bulletproof hosting service that was the subject of international sanctions issued Tuesday.

The raid on Wednesday at the Paul van Vlissingenstraat data center in Amsterdam “followed a long-term digital investigation into the activities of a hosting provider based there, called ZServers/XHost,” police said Thursday.

The sanctions announcements by the U.S., U.K. and Australia linked Zservers to the LockBit ransomware operation. Dutch police said their investigation also showed a link between the seized servers and the Conti cybercrime gang.

In addition to ransomware, the servers showed signs of related malware, including botnets, Dutch police said. 

“ZServers/XHost came into the focus of the investigation team a year ago. The company stood out because it advertised the possibility for customers to allow criminal acts from its servers,” the police statement said. “It was also stated that the owners of these servers would remain anonymous when law enforcement agencies would make inquiries with them, and payments for the services purchased could also be made anonymously via crypto currency.”

No arrests were announced. 

“The Cybercrime Team Amsterdam will, in consultation with the Public Prosecution Service, further investigate the data found on the seized servers,” Dutch police said.

The U.S. sanctions announcements labeled two Russian nationals — Alexander Igorevich Mishin and Aleksandr Sergeyevich Bolshakov — as administrators of Zservers. 

In addition to them, Britain listed four other employees as targets of sanctions, as well as Xhost Internet Solutions LP, described as a “UK front company”

CybercrimeGovernmentNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

An Italian journalist speaks about being targeted with Paragon spyware

Next Post

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Related Posts

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft's "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate, according to a new
Avatar
Read More