Users at over 191,000 organizations
Microsoft, in collaboration with international law enforcement agencies, has executed a significant takedown of the RedVDS cybercrime-as-a-service (CaaS) platform. This 'bulletproof' hosting service provided threat actors with cheap, anonymous, and disposable Windows-based virtual servers, which served as the launchpad for massive phishing campaigns, business email compromise (BEC), and other financial fraud schemes. The operation, led by Microsoft's Digital Crimes Unit and authorities in the U.S., U.K., and Germany, involved seizing critical infrastructure and taking the service's primary domains offline. The RedVDS platform, run by the threat group Storm-2470, is estimated to have facilitated over $40 million in fraud losses in the United States and compromised over 191,000 organizations worldwide since September 2025. This action marks a major disruption to the cybercrime ecosystem, forcing numerous threat actors to find new operational infrastructure.
The RedVDS service, active since 2019, specialized in offering low-cost (as little as $24/month) Remote Desktop Protocol (RDP) servers with a promise of anonymity and no activity logging. This made it an attractive platform for cybercriminals seeking disposable infrastructure for high-volume attacks. Key characteristics of the operation included:
The service was a key enabler for numerous threat actors, including Storm-2227 and users of the RaccoonO365 phishing kit. Attackers leveraged RedVDS servers to target a wide range of industries, including legal, construction, real estate, healthcare, and education, on a global scale.
The RedVDS platform was a foundational piece of the cybercrime supply chain, providing infrastructure as a service. Threat actors utilized this platform to conduct attacks mapped to the following MITRE ATT&CK techniques:
T1584 - Compromise Infrastructure: RedVDS itself provided pre-compromised or purpose-built infrastructure for malicious use.T1566 - Phishing: The primary use case for RedVDS servers was launching large-scale phishing campaigns to steal credentials and financial information.T1534 - Internal Spearphishing: Once an organization was breached, attackers could use compromised accounts to phish internally.T1078 - Valid Accounts: Credentials stolen via phishing were used to gain unauthorized access to corporate networks and cloud services.T1114 - Email Collection: After gaining access, attackers would collect email data for use in BEC and other fraud schemes.Attackers using RedVDS also employed a variety of tools to enhance their campaigns, including mailers like SuperMailer and UltraMailer, and increasingly, generative AI tools like ChatGPT to craft more convincing phishing lures.
The disruption of RedVDS has a significant, albeit temporary, impact on the cybercrime economy.
The following domains associated with the RedVDS service were taken down and are confirmed indicators of compromise:
| Type | Value | Description |
|---|---|---|
domain |
redvds[.]com |
Primary domain for the RedVDS cybercrime service. |
domain |
redvds[.]pro |
Alternate domain for the RedVDS service. |
domain |
vdspanel[.]space |
Domain for the RedVDS management panel. |
SuperMailer, UltraMailer, BlueMail, SquadMailer, and various email extractor tools on endpoints.Enforcing MFA across all external and internal services is the most effective defense against credential theft via phishing.
Mapped D3FEND Techniques:
Educating users on how to identify and report phishing attempts is a critical layer of defense to prevent initial compromise.
Utilize email and web filters to block known malicious domains, analyze URLs for suspicious patterns, and prevent users from accessing phishing sites.
Deploy endpoint protection to detect and block malicious email attachments and malware droppers associated with phishing campaigns.
To directly counter the primary goal of phishing campaigns launched from services like RedVDS, organizations must enforce Multi-Factor Authentication (MFA) on all externally accessible services, especially email (Office 365, Google Workspace), VPNs, and critical applications. This ensures that even if an attacker successfully steals a user's password, they cannot gain access without the second factor. Prioritize phishing-resistant MFA methods like FIDO2 security keys or authenticator apps over less secure methods like SMS. The implementation of MFA is the single most impactful technical control to mitigate the risk of account takeover from credential theft.
Deploy an advanced email security gateway capable of real-time URL analysis and rewriting. This technology scans every link in an incoming email, checking it against threat intelligence feeds for known malicious domains like those used by RedVDS. For unknown links, the service can 'detonate' the URL in a sandbox environment to check for malicious behavior before the user can click it. URL rewriting replaces the original link with a proxied version, allowing the security service to re-evaluate the destination every time it is clicked, protecting against delayed weaponization. This directly disrupts the phishing attack chain at the delivery stage.
Implement DNS filtering (also known as a protective DNS service) across the enterprise network. This service prevents endpoints from resolving requests for known malicious or suspicious domains, including those used for phishing landing pages, malware C2, and services like RedVDS. Configure policies to block categories like 'Newly Registered Domains,' 'Phishing,' and 'Anonymizers/Proxies.' This provides a broad layer of protection that can stop attacks even if they bypass email filters. Ensure historical DNS logs are retained and analyzed to hunt for past connections to the RedVDS IOCs and other suspicious domains.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats