Polish National Charged for Operating a Bulletproof Hosting Service Facilitating Cybercriminal Activities

US authorities have recently announced charges against Artur Karol Grabowski, a Polish national allegedly responsible for operating the LolekHosted.net bulletproof hosting service. This hosting service, as court documents reveal, has been offering secure web hosting services to facilitate cybercriminal activities for nearly a decade.

Background on LolekHosted.net

LolekHosted.net, a domain registered in 2014 by Artur Karol Grabowski, has been a hub for cybercriminals seeking secure web hosting services. Court documents suggest that Grabowski has been operating the company until the domain’s seizure. The service reportedly allowed clients to register accounts using false information while failing to maintain IP address logs and changing them regularly. Additionally, Grabowski ignored abuse complaints from third parties and even informed his clients about legal inquiries received.

Allegations against Artur Karol Grabowski

Grabowski is facing a multitude of charges in connection with his operation of LolekHosted.net. It is alleged that he knowingly allowed clients to use false information when registering accounts, which aided in masking their true identities. Moreover, Grabowski’s failure to maintain proper IP address logs hindered investigations into cybercriminal activities originating from the hosting service. The complaint also highlights his refusal to act upon abuse complaints from third parties.

NetWalker Ransomware and LolekHosted

One notable operation hosted on LolekHosted.net was the infamous NetWalker ransomware. This particular ransomware has wreaked havoc worldwide, victimizing over 400 individuals and organizations, including colleges, hospitals, law enforcement agencies, emergency services, municipalities, school districts, and universities. Court documents suggest that the LolekHosted servers were directly involved in launching approximately 50 NetWalker ransomware attacks against victims across the globe. The consequences of these attacks have been severe, causing significant disruptions and financial loss to the affected institutions.

Financial gain of NetWalker ransomware operators

Authorities have discovered that the operators behind the NetWalker ransomware have obtained substantial profits from their malicious activities. It is estimated that they have received more than $146 million worth of Bitcoin in ransom payments. This immense sum underscores the significant impact the ransomware attacks have had on victims and the immense profitability of such cybercrime operations.

Potential consequences for Grabowski

If found guilty, Artur Karol Grabowski could face severe penalties. The charges against him carry a maximum sentence of up to 45 years in prison. Additionally, Grabowski could be subject to the forfeiture of $21.5 million, reflecting the illicit financial gains amassed through his operation of the bulletproof hosting service.

Seizure of LolekHosted.net and Arrests in Poland

The seizure of LolekHosted.net and the pursuit of justice against the operators involved were the result of effective cooperation between law enforcement agencies in the United States and Poland. Europol also provided assistance in this joint effort. While the authorities managed to apprehend five alleged administrators of the bulletproof hosting service in Poland, Artur Karol Grabowski remains a fugitive at large, eluding justice thus far.

The charges filed against Artur Karol Grabowski shed light on the pernicious world of bulletproof hosting services and their contribution to facilitating cybercriminal activities. The case underscores law enforcement agencies’ commitment to combating such illicit operations and the importance of international cooperation in addressing cross-border cybercrime. As efforts continue to bring Grabowski to justice and dismantle the infrastructure supporting criminal activities, it is crucial to remain vigilant against the ever-evolving threats posed by cybercriminals.

Explore more

Maryland Data Center Boom Sparks Local Backlash

A quiet 42-acre plot in a Maryland suburb, once home to a local inn, is now at the center of a digital revolution that residents never asked for, promising immense power but revealing very few secrets. This site in Woodlawn is ground zero for a debate raging across the state, pitting the promise of high-tech infrastructure against the concerns of

Trend Analysis: Next-Generation Cyber Threats

The close of 2025 brings into sharp focus a fundamental transformation in cyber security, where the primary battleground has decisively shifted from compromising networks to manipulating the very logic and identity that underpins our increasingly automated digital world. As sophisticated AI and autonomous systems have moved from experimental technology to mainstream deployment, the nature and scale of cyber risk have

Ransomware Attack Cripples Romanian Water Authority

An entire nation’s water supply became the target of a digital siege when cybercriminals turned a standard computer security feature into a sophisticated weapon against Romania’s essential infrastructure. The attack, disclosed on December 20, targeted the National Administration “Apele Române” (Romanian Waters), the agency responsible for managing the country’s water resources. This incident serves as a stark reminder of the

African Cybercrime Crackdown Leads to 574 Arrests

Introduction A sweeping month-long dragnet across 19 African nations has dismantled intricate cybercriminal networks, showcasing the formidable power of unified, cross-border law enforcement in the digital age. This landmark effort, known as “Operation Sentinel,” represents a significant step forward in the global fight against online financial crimes that exploit vulnerabilities in our increasingly connected world. This article serves to answer

Zero-Click Exploits Redefined Cybersecurity in 2025

With an extensive background in artificial intelligence and machine learning, Dominic Jainy has a unique vantage point on the evolving cyber threat landscape. His work offers critical insights into how the very technologies designed for convenience and efficiency are being turned into potent weapons. In this discussion, we explore the seismic shifts of 2025, a year defined by the industrialization