US, UK, Australia sanction Russia-based Zservers over Lockbit ransomware attacks

US, UK, Australia sanction Russia-based Zservers over Lockbit ransomware attacks

The United States, the United Kingdom and Australia took action against Zservers, a Russia-based bulletproof hosting (BPH) service provider, for its role in facilitating Lockbit ransomware attacks.

Zservers is responsible for providing cybercriminals with secure servers and other critical infrastructure designed to evade law enforcement detection. Th infrastructure is often used by cybercriminals to plan and execute ransomware attacks, including those orchestrated by affiliates of the notorious Lockbit group.

The US Treasury’s Office of Foreign Assets Control (OFAC) also sanctioned two key Russian nationals, Bolshakov Aleksandr Sergeyevich (aka SERGEEVICH, Aleksandr Bol'shakov, "AAELBAS", "WTLFNT") and Mishin Alexander Igorevich (aka MISHIN, Aleksandr Igorvich, "ALEX560560", "JAMES1789", "KLICHKO, Ivan P", "PIPPIN, James", "SASHA-BRN", "TRIPLEX560") associated with Zservers, labeling them as principal administrators of the service.

The UK’s sanctions specifically target Zservers as a central player in the global cybercrime supply chain. According to UK authorities, Zservers explicitly advertises itself as a BPH provider, offering its services to illicit actors who seek to carry out cyberattacks.

The UK government also took action against six Zservers employees, labeling them as part of the larger cybercrime syndicate responsible for crippling ransomware attacks worldwide. In addition, the UK front company XHOST Internet Solutions LP, believed to be connected to Zservers, was also added to the sanctions list.

Lockbit ransomware affiliates have been known to use Zservers' services as a launching pad for attacks against various targets, including critical sectors such as non-profits.

The full list of entities and individuals targeted by sanctions include ZSERVERS, XHOST Internet Solutions LP, Aleksandr Bolshakov (employee), Aleksandr Mishin (employee), Ilya Sidorov (employee), Dmitriy Bolshakov (employee), Igor Odintsov (employee), and Vladimir Ananev (employee).


Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025