Proton66 Hosting Service Exploited in Global Cyberattacks

Article Highlights
Off On

The global cybersecurity landscape has been significantly impacted by the exploitation of Proton66, a Russian bulletproof hosting service provider. Since January 8, 2025, cybersecurity researchers from Trustwave SpiderLabs have observed a disturbing increase in malicious activities such as mass scanning, credential brute-forcing, and exploitation attempts originating from Proton66’s IP addresses. Specifically, net blocks 45.135.232.0/24 and 45.140.17.0/24 have demonstrated notable activity. Alarmingly, several of the IP addresses involved were previously unrelated to malicious actions or had been dormant for years, raising concerns about the evolving capabilities of cybercriminals leveraging Proton66’s infrastructure.

Connection to PROSPERO and Historical Context

Proton66’s link to another autonomous system named PROSPERO adds a layer of complexity to its operations. Historically connected to bulletproof hosting services such as Securehost and BEARHOST, PROSPERO has been a notable player in Russian cybercrime forums. This connection enhances Proton66’s ability to support various cyberattacks. Several malware families, including GootLoader and SpyNote, have exploited Proton66 to host their command-and-control servers and phishing pages, underlining its operational significance. In February 2025, revelations indicated that PROSPERO had been routing operations through networks managed by Kaspersky Lab, although Kaspersky firmly denies any collaboration. This historical backdrop provides insights into Proton66’s expanded role in recent cyberattacks. Exploitation of critical vulnerabilities such as CVE-2025-0108, CVE-2024-41713, CVE-2024-10914, CVE-2024-55591, and CVE-2025-24472 underscores the advanced threat landscape. Notably, an access broker known as Mora_001 exploited two Fortinet FortiOS flaws to deliver a new ransomware strain called SuperBlack, emphasizing the potency of such vulnerabilities in facilitating complex attacks.

Noteworthy Malware Campaigns and Exploitation Techniques

Trustwave’s findings highlight various malware campaigns associated with Proton66, revealing sophisticated techniques used in these attacks. Among the notable campaigns is the distribution of XWorm, StrelaStealer, and a ransomware known as WeaXor. One particularly concerning campaign involved compromised WordPress sites linked to the Proton66 IP address 91.212.166[.]21, which redirected Android users to phishing pages mimicking Google Play. These phishing pages deceived users into downloading malicious APK files. The redirection mechanism employed obfuscated JavaScript and implemented checks to exclude crawlers and VPN users, targeting French, Spanish, and Greek speakers. Another significant Proton66 activity involved malware deployment through a ZIP archive, which led to XWorm infiltration. This campaign specifically targeted Korean-speaking chat room users, employing a complex sequence starting from a Windows shortcut executing a PowerShell command, eventually downloading and running the XWorm binary. Additionally, Proton66 infrastructure was linked to a phishing campaign targeting German-speaking users with StrelaStealer, which communicated with a specific command-and-control (C2) IP address, further demonstrating the adaptability and range of Proton66-facilitated attacks.

Mitigation Strategies and Future Considerations

The WeaXor ransomware, a revised iteration of Mallox, was also discovered communicating with a Proton66 C2 server, posing significant risks to targeted organizations. In light of these threats, cybersecurity experts advocate for blocking all Classless Inter-Domain Routing (CIDR) ranges associated with Proton66 as well as Chang Way Technologies, a potentially related provider based in Hong Kong. This proactive measure aims to minimize the risk of cyber threats emanating from this infrastructure. Organizations must prioritize robust monitoring and advanced threat detection to mitigate potential vulnerabilities. Continuous updates to security protocols, alongside comprehensive training for personnel, are essential in staying ahead of evolving cyber threats. By focusing on these strategies, entities can better defend against the diverse range of attacks facilitated by Proton66 and similar malicious infrastructures.

Moving Forward

The global cybersecurity scene has been deeply affected by the misuse of Proton66, a Russian bulletproof hosting service. Since January 8, 2025, Trustwave SpiderLabs’ cybersecurity experts have witnessed a troubling rise in malicious activities linked to Proton66’s IP addresses, including mass scanning, credential brute-forcing, and exploitation attempts. Particularly, net blocks 45.135.232.0/24 and 45.140.17.0/24 have shown significant activity. Disturbingly, some of these IP addresses had no prior history of malicious use or had been inactive for several years, raising serious concerns about the growing capabilities of cybercriminals who are exploiting Proton66’s infrastructure. This development indicates an alarming shift in cyber threats, making it evident that these criminals are evolving and becoming more sophisticated. The use and abuse of such services highlight the need for stronger cybersecurity measures and more vigilant monitoring to counteract these emerging threats in the digital landscape.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the