InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Hackers abuse Russian bulletproof host Proton66 for global attacks and malware delivery
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Hackers abuse Russian bulletproof host Proton66 for global attacks and malware delivery
Technology

Hackers abuse Russian bulletproof host Proton66 for global attacks and malware delivery

April 21, 2025 5 Min Read
Share
Russian Bulletproof Host Proton66
SHARE

Cybersecurity researchers have revealed a surge in “mass scans, entitlement brutes and attempts to exploit” derived from IP addresses associated with Russian bulletproof hosting service providers. Proton 66.

According to a two-part analysis published by TrustWave SpiderLabs, this activity detected since January 8, 2025 is targeted at organizations around the world.

“Netblocks 45.135.232.0/24 and 45.140.17.0/24 were particularly active in terms of mass scans and brute force attempts,” said security researchers Pawel Knapczyk and Dawid Nesterwicz. “Some of the problematic IP addresses were previously not seen as involved in malicious activities and were inactive for over two years.”

Proton 66 of the Russian autonomous system is rated as linked to another autonomous system named Prospero. Last year, French security company Intrinsec detailed its relationship with SecureHost and bulletproof services sold at Russian Cybercrime Forum under the name Bearhost.

Several malware families, including Gootloader and Spynote, host command and control (C2) servers and phishing pages on Proton66. Earlier this February, security journalist Brian Krebs revealed that Prospero had begun to route operations through a network run by Moscow’s Russian anti-virus vendor Kaspersky Lab.

However, Kaspersky has denied that he is working with Prospero as Kaspersky’s automated system (AS) path may appear as a technical prefix because the company works and provides DDOS services and provides DDOS services, and that “routing through the network through a network operated by Kaspersky does not mean providing the company’s services.”

A recent analysis from TrustWave reveals that a malicious request originating from one of the February 2025 Proton66 netblocks (193.143.1 (.)65) attempted to exploit some of the latest important vulnerabilities.

  • CVE-2025-0108 -PaloAlto Networks Pan-OS Software Authentication Bypass Vulnerability
  • CVE-2024-41713 – Insufficient input validation vulnerability in Nupoint Unified Messaging (NPM) components in Mitel Micollab
  • CVE-2024-10914 – Command injection vulnerability D-Link NAS
  • CVE-2024-55591 & CVE-2025-24472 – Fortinet Fortios Authentication Bypass Vulnerability
See also  Looking for "Owls and Lizards" in advertisers

It is worth noting that the exploitation of the two Fortinet Fortios flaws is attributed to an early access broker called Mora_001. MORA_001 has been observed to offer a new ransomware strain called SuperBlack.

The cybersecurity company also observed several malware campaigns linked to Proton66, designed to distribute ransomware named Xworm, Strellastealer and Weaxor.

Another notable activity concerns the use of compromised WordPress websites related to Proton66-related IP address “91.212.166(.)21” and redirects Android device users to phishing pages that mimic the list of Google Play apps and mimic the users of malicious APK files downloads.

Redirection is facilitated by malicious JavaScript hosted on a Proton66 IP address. Analyses of fake playstore domain names show that the campaign is designed to target speaking users in French, Spanish and Greek.

“The redirector script is obfuscated and performs several checks on the victim, including excluding crawlers and VPN or proxy users,” the researchers explained. “The user IP is retrieved through a query to ipify.org. The presence of the VPN in the proxy is then verified through subsequent queries to ipinfo.io. Ultimately, the redirection only occurs when an Android browser is found.”

Also hosted on one of the Proton66 IP addresses is a ZIP archive that leads to the deployment of XWorm malware, which selects Korean-speaking chat room users, particularly using social engineering schemes.

The first stage of an attack is the Windows Shortcut (LNK) that runs the PowerShell commands. This runs a visual basic script that downloads base64-encoded .NET DLLs from the same IP address. The DLL proceeds to download and loading the XWorm binaries.

See also  CISA flags actively exploit vulnerabilities in SonicWall SMA devices

The Proton66-linked infrastructure is also used to facilitate phishing email campaigns targeting German-speaking users with Strelasteler, an information stolen communication with C2 IP addresses (193.143.1 (.)205).

Finally, I found out that the Weaxor ransomware artifact (a revised version of Mallox) is in contact with a C2 server on the Proton66 network (“193.143.1(.)139”).

Organizations are advised to block all Classless Inter-Domain Routing (CIDR) ranges associated with Hong Kong-based providers Proton66 and Chang Way Technologies to neutralize potential threats.

Share This Article
Twitter Copy Link
Previous Article Runescape dragonwilds mods and private server "are definitely on the table" Runescape dragonwilds mods and private server “are definitely on the table”
Next Article mm Within Openai’s O3 and O4 ‑ Mini: Unlock new possibilities through multimodal inference and integrated toolset

Latest News

iPhone Spyware, Microsoft 0-Day, Tokenbreak Hack, AI Data Leaks, etc.

iPhone Spyware, Microsoft 0-Day, Tokenbreak Hack, AI Data Leaks, etc.

Some of the biggest security issues start quietly. There are…

June 16, 2025
mm

Why LLMS is thinking too much about simple puzzles, but give up on hard puzzles

Artificial intelligence has made incredible advances with large-scale language models…

June 15, 2025
JSFireTruck JavaScript Malware

Over 269,000 websites infected with JSFiretruck JavaScript malware

Cybersecurity researchers are paying attention to "large campaigns" that undermine…

June 15, 2025
You need to know what features you need with 6 new ChatGPT projects

You need to know what features you need with 6 new ChatGPT projects

The ChatGPT project has just received the most significant update…

June 14, 2025
AsyncRAT and Skuld Stealer

Discord Invite Link Hijacking offers Asyncrat and Skuld Stealer targeted at crypto wallets

The new malware campaign is taking advantage of the weaknesses…

June 14, 2025

You Might Also Like

Top 10 Best Practices for Effective Data Protection
Technology

Top 10 Best Practices for Effective Data Protection

12 Min Read
mm
Technology

Using AI for Wendy’s drive-thru order: Is AI the future of fast food?

12 Min Read
mm
Technology

JPEG AI blurs the line between the real thing and the synthesis

18 Min Read
Google deploys AI protection on your device to detect Chrome and Android scams
Technology

Google deploys AI protection on your device to detect Chrome and Android scams

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?