US, UK, Australia sanction Russia-based Zservers over Lockbit ransomware attacks

US, UK, Australia sanction Russia-based Zservers over Lockbit ransomware attacks

The United States, the United Kingdom and Australia took action against Zservers, a Russia-based bulletproof hosting (BPH) service provider, for its role in facilitating Lockbit ransomware attacks.

Zservers is responsible for providing cybercriminals with secure servers and other critical infrastructure designed to evade law enforcement detection. Th infrastructure is often used by cybercriminals to plan and execute ransomware attacks, including those orchestrated by affiliates of the notorious Lockbit group.

The US Treasury’s Office of Foreign Assets Control (OFAC) also sanctioned two key Russian nationals, Bolshakov Aleksandr Sergeyevich (aka SERGEEVICH, Aleksandr Bol'shakov, "AAELBAS", "WTLFNT") and Mishin Alexander Igorevich (aka MISHIN, Aleksandr Igorvich, "ALEX560560", "JAMES1789", "KLICHKO, Ivan P", "PIPPIN, James", "SASHA-BRN", "TRIPLEX560") associated with Zservers, labeling them as principal administrators of the service.

The UK’s sanctions specifically target Zservers as a central player in the global cybercrime supply chain. According to UK authorities, Zservers explicitly advertises itself as a BPH provider, offering its services to illicit actors who seek to carry out cyberattacks.

The UK government also took action against six Zservers employees, labeling them as part of the larger cybercrime syndicate responsible for crippling ransomware attacks worldwide. In addition, the UK front company XHOST Internet Solutions LP, believed to be connected to Zservers, was also added to the sanctions list.

Lockbit ransomware affiliates have been known to use Zservers' services as a launching pad for attacks against various targets, including critical sectors such as non-profits.

The full list of entities and individuals targeted by sanctions include ZSERVERS, XHOST Internet Solutions LP, Aleksandr Bolshakov (employee), Aleksandr Mishin (employee), Ilya Sidorov (employee), Dmitriy Bolshakov (employee), Igor Odintsov (employee), and Vladimir Ananev (employee).


Back to the list

Latest Posts

Moldovan authorities arrest suspect tied to DoppelPaymer ransomware attacks

Moldovan authorities arrest suspect tied to DoppelPaymer ransomware attacks

The suspect remains in custody and is awaiting extradition to the Netherlands.
13 May 2025
North Korean TA406 hackers target Ukraine in ongoing phishing campaigns

North Korean TA406 hackers target Ukraine in ongoing phishing campaigns

The campaigns aim to harvest credentials and deliver malware, likely to gather intelligence related to the ongoing Russian invasion of Ukraine.
13 May 2025
International operation takes down Anyproxy and 5Socks botnet services

International operation takes down Anyproxy and 5Socks botnet services

In a separate action, German authorities shut down the German server infrastructure of the crypto swapping service eXch, suspected of laundering illicit funds.
13 May 2025