![]() |
Description: Groups calling themselves IT Army of Russia and TwoNet are newly active on Telegram, coordinating operations and seeking new members, researchers at Intel 471 said.
July 3rd, 2025 (2 days ago)
|
![]() |
Description: Russian authorities said the man used malware to attack Russian information systems in 2022, blocking access to websites of several local companies and damaging critical infrastructure.
July 3rd, 2025 (2 days ago)
|
![]() |
Description: A Russian APT known as "Gamaredon" is using spear-phishing attacks and network-drive weaponization to target government entities in Ukraine.
July 2nd, 2025 (3 days ago)
|
![]() |
July 2nd, 2025 (3 days ago)
|
![]() |
Description: The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to assist threat actors in their malicious activities and targeting victims in the country and across the world.
The sanctions also extend to its subsidiaries Aeza International Ltd., the U.K. branch of Aeza Group, as well
July 2nd, 2025 (4 days ago)
|
![]() |
Description: Support for ransomware, darknet drug markets and other cybercrime activity landed the Russian company Aeza Group on the U.S. government's sanctions list, the Treasury Department said.
July 1st, 2025 (4 days ago)
|
![]() |
Description: The U.S. Department of the Treasury has sanctioned Russian hosting company Aeza Group and four operators for allegedly acting as a bulletproof hosting company for ransomware gangs, infostealer operations, darknet drug markets, and Russian disinformation campaigns. [...]
July 1st, 2025 (4 days ago)
|
![]() |
Description: A Russian hosting provider allegedly involved in a recent cyberattack against independent media organizations in the country is reportedly connected to a state-affiliated research center sanctioned by the U.S.
July 1st, 2025 (4 days ago)
|
![]() |
Description: Russia has been cracking down on Cloudflare for months, with similar restrictions imposed on other foreign cloud and hosting providers.
June 30th, 2025 (5 days ago)
|
![]() |
Description: The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66.
Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its
June 30th, 2025 (5 days ago)
|