Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Home/Threats/Microsoft & Authorities Dismantle RedVDS BEC Attack Chain
Threats

Microsoft & Authorities Dismantle RedVDS BEC Attack Chain

Microsoft and international law enforcement, collaborating in a joint operation, have dismantled a business email compromise (BEC) attack chain. This chain was powered by the RedVDS fraud engine....

Emy Elsamnoudy
Emy Elsamnoudy
January 15, 2026 3 Min Read
3 0

Microsoft and international law enforcement, collaborating in a joint operation, have dismantled a business email compromise (BEC) attack chain. This chain was powered by the RedVDS fraud engine.

RedVDS operated as a low‑cost “cybercrime subscription” platform, giving criminals disposable virtual machines that looked like normal Windows systems on the internet.

Using these rented hosts, threat actors sent huge waves of phishing emails, hosted fake portals, and staged payment diversion schemes against companies in finance, real estate, healthcare, and manufacturing.

The attack chain was simple but very effective. Criminals first used RedVDS virtual machines to send targeted phishing emails that harvested credentials from Microsoft 365 and other mail platforms.

Once they gained mailbox access, they quietly watched real threads between vendors, clients, and internal teams, waiting for invoices, wire transfers, or closing instructions.

At the right moment, they injected fake replies with new bank details, routing large payments to accounts they controlled.

Microsoft analysts identified that RedVDS amplified this fraud by combining high‑volume infrastructure with AI tools that generated convincing email text, fake voice messages, and even deepfake videos.

On peak days, more than 2,600 RedVDS virtual machines sent around one million phishing messages to Microsoft customers alone, helping criminals compromise or abuse access to over 191,000 organizations worldwide.

RedVDS’s user dashboard (Source - Microsoft)
RedVDS’s user dashboard (Source – Microsoft)

The coordinated takedown seized RedVDS domains, disrupted its payment channels, and removed a core pillar of this fraud ecosystem.

Investigators also tracked RedVDS use in real estate payment diversion, where hijacked mailboxes for agents and title firms were used to send fake closing instructions.

BEC attack chain powered by RedVDS (Source - Microsoft)
BEC attack chain powered by RedVDS (Source – Microsoft)

In many cases, victims wired their life savings to mule accounts within minutes of receiving the spoofed message.

How the RedVDS BEC Chain Operated

At a technical level, the BEC chain followed a repeatable script. Threat actors created or rented a RedVDS instance, deployed basic tooling, and pivoted into live mailboxes using stolen credentials.

Microsoft’s legal actions are reinforced by close collaboration with law enforcement partners around the world (Source - Microsoft)
Microsoft’s legal actions are reinforced by close collaboration with law enforcement partners around the world (Source – Microsoft)

A common pattern involved scripted login checks and inbox scans:-

for user in target_users:
    if login(user.email, user.passwd, proxy=redvds_host):
        for msg in inbox.search("invoice OR payment OR wire"):
            if "upcoming" in msg.body.lower():
                mark_as_watchlist(msg.thread_id)

Once a payment thread was flagged, the actor crafted a reply from the compromised account, often reusing real signatures and footers:-

fake_reply = build_reply(original_thread,
    body=new_bank_instructions,
    from_account=compromised_mailbox)
send(fake_reply, via=redvds_host)

Microsoft researchers noted that this structured playbook, combined with disposable RedVDS nodes, made the fraud easy to scale and hard to trace.

The recent operation shows that targeting shared crime infrastructure, not just single accounts, is key to shrinking the global BEC attack surface.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackphishingThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Critical WordPress Plugin Exploit Grants Instant Admin Access

Next Post

Critical Cal.com Flaw Lets Attackers Hijack User Vulnerability Bypass

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us