Bulletproof hosting providers renting cheap infrastructure to supply virtual machines to ransomware hackers
Most high-profile ransomware groups were using the same infrastructure
Sign up for breaking news, reviews, opinion, top tech deals, and more.
You are now subscribed
Your newsletter sign-up was successful
- Sophos reports bulletproof hosting providers renting VMmanager-based servers to cybercriminals
- Identical Windows templates leave thousands of exposed servers exploited for ransomware and malware campaigns
- Infrastructure linked to major groups (LockBit, Conti, BlackCat, Qilin, TrickBot, etc.) and sanctioned Russian hosting firm
Bulletproof hosting providers are renting cheap infrastructure to cybercriminals, providing them with virtual machines they can use in ransomware attacks, new research has found.
A report from Sophos explained how legitimate services were being abused to launch attacks at massive scales without the need to build custom infrastructure.
Whilst investigating several ransomware attacks, the team discovered many attackers were using Windows servers with identical hostnames (a name assigned to a device on a network). Since it was obvious that all those attacks couldn’t have been done by a single attacker, they dug deeper and found that the systems were actually virtual machines created from the same prebuilt Windows templates.
Abuse through bulletproof hosting
These were supplied by ISPsystem VMmanager, a legitimate virtualization platform that’s apparently widely used among hosting providers. When they create a new VM, the templates don’t randomize hostnames, resulting in thousands of unrelated servers on the internet ending up looking almost identical.
Now, Sophos says cybercriminals are exploiting this, at scale, through bulletproof hosting providers (hosting companies that don’t react to takedown requests or abuse reports) which rent out VMmanager-based servers to crooks.
Using Shodan, the researchers managed to find tens of thousands of internet-exposed servers with the same hostnames. Almost all of them (95%) came from a handful of Windows templates, and many were KSM-enabled (Windows runs free for 180 days without a license).
Sophos says the servers are linked to major malicious operations: LockBit, Conti, BlackCat (ALPHV), Qilin, TrickBot, Ursnif, RedLine, NetSupport, and many others. It also said most of the infrastructure was tied to specific hosting companies, and singled out two names - Stark Industries Solutions, and First Server Limited.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Both are apparently linked to Russian state-sponsored threat actors and have been sanctioned by the EU and UK in the past.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.