Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/Threats/Bulletproof Hosting Leverages ISPsystem Servers for Cyber
Threats

Bulletproof Hosting Leverages ISPsystem Servers for Cyber

The evolving landscape of online threats reveals a new tactic: cybercriminals are now strengthening their attacks by concealing them behind legitimate technology. Late in 2025, a series of ransomware...

Emy Elsamnoudy
Emy Elsamnoudy
February 6, 2026 3 Min Read
6 0

The evolving landscape of online threats reveals a new tactic: cybercriminals are now strengthening their attacks by concealing them behind legitimate technology.

Late in 2025, a series of ransomware incidents revealed that attackers were using virtual machines provisioned through ISPsystem, a popular platform used by hosting companies to manage their servers.

By renting these virtual computers, criminals gained access to powerful infrastructure that appeared trustworthy, allowing them to launch attacks without triggering immediate alarms.

This abuse of commercial infrastructure highlights a growing sophistication in how threat actors procure their resources, shifting from compromised home computers to high-bandwidth data center assets.

These virtual machines became the launchpad for some of the most dangerous ransomware variants, including WantToCry, LockBit, and BlackCat.

The attackers utilized these servers to establish remote connections, distribute malicious software, and control infected networks from a safe distance.

Since the servers were hosted on legitimate networks, they bypassed many standard security blocks that typically flag suspicious traffic.

This method provided a stable and reliable base of operations, making it difficult for defenders to shut them down quickly.

The integration of commodity malware delivery mechanisms further complicates the defensive posture for affected organizations, requiring more advanced detection strategies.

Sophos analysts noted this malicious activity after observing a distinct pattern in the network identifiers of the attacking machines.

They discovered that thousands of these servers shared the exact same computer names, derived from the hosting software’s default templates.

Locations of devices using these hostnames based on associated IP address (Source - Sophos)
Locations of devices using these hostnames based on associated IP address (Source – Sophos)

This oversight allowed researchers to trace the widespread infrastructure, identifying over 3,000 active devices in regions including Russia, Europe, and the United States.

The sheer volume of these machines suggests a highly organized effort to maintain a resilient network for criminal operations.

Exploiting Static Configuration Templates

The persistence of this threat relies heavily on how these virtual environments are sold.

Service providers like “MasterRDP,” operating as rdp.monster, have built a business model around selling these pre-configured servers.

They market these services on underground forums as “bulletproof,” promising that the servers will remain online despite abuse reports.

These providers act as a critical supply chain link, offering affordable access to dedicated hardware that facilitates large-scale malicious campaigns.

By purchasing these resources, attackers can bypass the complex technical challenges of building their own botnets.

Virtual machine services offered by rdp.monster (Source - Sophos)
Virtual machine services offered by rdp.monster (Source – Sophos)

The technical mechanism enabling this scale is the use of static templates within the VMmanager software.

When a new virtual machine is set up using these default templates, it retains specific system identifiers instead of creating unique ones.

This lack of randomization means that every server spawned from the same template looks identical at a system level.

This feature simplifies management for legitimate administrators but inadvertently provided cybercriminals with a standardized, mass-produced fleet of attack servers ready for immediate deployment.

Recommendations include avoiding default templates and implementing stricter randomization protocols to prevent such uniform exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareransomwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Transparent Tribe Attacks India’s Startup Ecosystem in New Campaign

Next Post

Claude Opus 4.6 Boosts Cybersecurity Released Improved

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us