Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Home/Threats/1,250+ C2 Servers Mapped Across Russian Hosting Across 165 Providers
Threats

1,250+ C2 Servers Mapped Across Russian Hosting Across 165 Providers

Cybersecurity researchers have identified a substantial and organized network of malicious infrastructure operating discreetly within Russia’s commercial hosting environment. Over a three-month...

Marcus Rodriguez
Marcus Rodriguez
April 16, 2026 3 Min Read
8 0

Cybersecurity researchers have identified a substantial and organized network of malicious infrastructure operating discreetly within Russia’s commercial hosting environment.

Over a three-month window from January 1 to April 1, 2026, more than 1,250 active command-and-control (C2) servers were detected across 165 Russian infrastructure providers, spanning shared hosting platforms, virtual server environments, and telecommunications networks.

A command-and-control server is the backbone of most cyberattacks — the system attackers use to send instructions to infected machines and retrieve stolen data.

Finding over 1,250 of these servers active at once, all housed within Russian hosting providers, shows how deeply malicious infrastructure has embedded itself into legitimate commercial networks.

The servers are not concentrated in one or two obscure corners of the internet; they are distributed across 165 separate providers, making them harder to block and easier to maintain without drawing attention.

Hunt.io analysts and researchers identified these patterns using Host Radar, a core intelligence module built to correlate C2 servers, phishing infrastructure, open malicious directories, and public indicators of compromise back to the hosting providers that sustain them.

Their analysis surfaced repeatable patterns in how malicious infrastructure is distributed and reused across Russian hosting environments, providing provider-level visibility that separates actionable intelligence from a stream of disposable IP addresses.

Across the full dataset, Host Radar recorded approximately 1,290 malicious artifacts during the observation period. C2 infrastructure dominates, accounting for roughly 88.6% of all detected activity with 1,252 servers confirmed.

Malicious open directories make up about 5.3%, phishing sites roughly 4.9%, and publicly reported indicators of compromise around 1.2%.

TimeWeb leads with 311 detected C2 servers over 90 days, followed by WebHost1 with 140, REG.RU with 138, VDSina with 86, and PROSPERO OOO with 80.

Malware Families and Active Campaigns

Using HuntSQL, analysts queried telemetry across Russian networks to identify which malware families were hosting the most C2 infrastructure.

Keitaro, a traffic distribution system frequently abused to redirect victims toward malware, leads the dataset with 587 unique C2 IP addresses — the largest concentration observed.

Hajime, an IoT-focused botnet, follows with 191 C2 servers, while Mozi and Mirai reflect ongoing abuse of compromised routers and embedded devices.

Offensive security frameworks including Tactical RMM (87 endpoints), Cobalt Strike variants (55 combined), Sliver, and Ligolo-ng were also found, all repurposed for malicious use.

Scanning and phishing tools like Acunetix, Interactsh, and Gophish were detected as well, confirming this infrastructure supports reconnaissance and credential theft alongside direct intrusions. 

Top 10 Malware Command-and-Control (C2) Families (Source - Hunt.io)
Top 10 Malware Command-and-Control (C2) Families (Source – Hunt.io)

Active campaigns tied to this infrastructure reinforce the gravity of these findings. One campaign on JSC TIMEWEB used a fake CAPTCHA technique called ClickFix to trick users into executing a PowerShell command that downloaded Latrodectus v2.3 malware communicating with attacker-controlled domains. 

REG.RU-hosted infrastructure was linked to a Lumma Stealer operation abusing Google Groups redirectors to push malicious archives across Windows and Linux systems.

On Hosting Technology LTD infrastructure, the SmartApeSG campaign delivered Remcos RAT through fake CAPTCHA prompts on compromised sites, establishing persistence via DLL sideloading.

Beget LLC infrastructure hosted activity tied to the UAC-0252 campaign, which impersonated Ukrainian government institutions and deployed SHADOWSNIFF and SALATSTEALER infostealers through a WinRAR vulnerability tracked as CVE-2025-8088.

Top ISPs hosting malware (Source - Hunt.io)
Top ISPs hosting malware (Source – Hunt.io)

Proton66 OOO infrastructure was separately connected to a BoryptGrab infostealer operation abusing over 100 public GitHub repositories through SEO manipulation.

Security teams should treat provider-level monitoring as a core defensive priority. Applying controls against the highest-volume providers — especially TimeWeb, REG.RU, WebHost1, VDSina, and PROSPERO OOO — can meaningfully reduce exposure.

Organizations should monitor outbound connections to Russian ASNs with elevated C2 activity, apply threat intelligence covering infrastructure-level indicators beyond file hashes, restrict curl-to-PowerShell chains vulnerable to ClickFix-style lures, and maintain visibility into IoT and edge devices given the continued activity of Hajime, Mozi, and Mirai botnets.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityMalwarephishingSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Use AI Content on Google Discover for Malicious Push

Next Post

Fake Adobe Reader Delivers ScreenConnect via Stealthy Loader

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical GitLab Flaws Allow XSS and Unauthenticated Do
May 14, 2026
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us