An investigation by Sophos has revealed how bulletproof hosting (BPH) providers are weaponizing legitimate server management software to create anonymous infrastructure for cybercrime. Researchers found that BPH providers are using ISPsystem's VMmanager, a tool for creating virtual machines, to provision servers for notorious ransomware groups. A default hostname pattern (WIN-J9D866ESIJ2) left by the software created a digital fingerprint, allowing Sophos to identify thousands of servers used in malicious operations. This infrastructure, provided by entities like Stark Industries Solutions and MasterRDP, has been directly tied to attacks involving top ransomware families such as LockBit, BlackCat, and Conti. This report details the symbiotic relationship between legitimate software vendors, complicit hosting providers, and elite cybercriminal gangs.
This research exposes a key part of the cybercrime supply chain: the provisioning of anonymous, resilient infrastructure.
rdp.monster).The core issue is not a vulnerability in the ISPsystem software, but its adoption and use by hosting providers who knowingly cater to criminals. These BPH providers form a foundational layer of the cybercrime economy.
The investigation began during the analysis of a ransomware attack where the virtual machine used by the attackers had a default hostname of WIN-J9D866ESIJ2. This is not a standard Windows hostname but is generated by the VMmanager software during the automated creation of a Windows Server VM.
By searching for this and similar default hostnames across the internet, Sophos was able to pivot and identify a massive network of servers with the same digital fingerprint. This allowed them to map out the infrastructure provided by the BPH services and link it to specific cybercriminal campaigns.
This technique of using default configurations as an identifier is a classic threat intelligence methodology. It highlights how even non-malicious artifacts can become powerful indicators when they are consistently associated with criminal activity. The BPH providers offer these pre-configured, anonymous RDP servers on underground forums, making it easy for less sophisticated actors to rent infrastructure for their attacks.
The abuse of legitimate software by BPH providers has a significant impact on the entire cybersecurity landscape:
The key observable from this research is the default hostname pattern.
| Type | Value | Description |
|---|---|---|
| other | WIN-J9D866ESIJ2 |
Default hostname generated by ISPsystem VMmanager for Windows VMs. |
| other | WIN-??????????? |
General pattern for default hostnames. Presence of servers with these names communicating with a network could indicate malicious activity. |
WIN-J9D866ESIJ2 is identified, it should be treated as a strong indicator of an externally-managed malicious server, and immediate isolation is required.Use IP reputation feeds and explicit blocklists to deny all traffic to and from IP ranges associated with known bulletproof hosting providers.
Block or heavily restrict RDP access from the internet to prevent attackers from using these anonymous servers to connect to internal systems.
Organizations must implement stringent inbound traffic filtering based on threat intelligence to counter infrastructure provided by bulletproof hosters. This involves subscribing to high-quality IP reputation and threat intelligence feeds that identify and flag IP addresses and ASNs associated with services like Stark Industries Solutions and MasterRDP. Perimeter firewalls and cloud security groups should be configured to automatically block all inbound connections from these malicious sources. Specifically for RDP, access should be denied by default from all external IPs, with exceptions only for trusted partners via a secure gateway. This proactive blocking prevents ransomware operators from using their anonymously-provisioned servers to establish initial RDP sessions into the target network.
Since the servers provisioned by these bulletproof hosters are often used for RDP access, monitoring local account usage is a critical detection strategy. Security teams should establish a baseline of normal RDP login activity. Alerts should be configured for anomalous patterns, such as logins to a server from a new or unusual geographic location, multiple failed login attempts followed by a success, or logins occurring outside of normal business hours. Furthermore, hunting for the default hostname pattern (WIN-J9D866ESIJ2) in the source hostname field of Windows logon events (Event ID 4624) can directly identify when an attacker is connecting from one of these malicious, pre-configured virtual machines. This provides a high-fidelity signal that an external threat actor is attempting to access the network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats