Proton66 Hosting Service Exploited in Global Cyberattacks

Article Highlights
Off On

The global cybersecurity landscape has been significantly impacted by the exploitation of Proton66, a Russian bulletproof hosting service provider. Since January 8, 2025, cybersecurity researchers from Trustwave SpiderLabs have observed a disturbing increase in malicious activities such as mass scanning, credential brute-forcing, and exploitation attempts originating from Proton66’s IP addresses. Specifically, net blocks 45.135.232.0/24 and 45.140.17.0/24 have demonstrated notable activity. Alarmingly, several of the IP addresses involved were previously unrelated to malicious actions or had been dormant for years, raising concerns about the evolving capabilities of cybercriminals leveraging Proton66’s infrastructure.

Connection to PROSPERO and Historical Context

Proton66’s link to another autonomous system named PROSPERO adds a layer of complexity to its operations. Historically connected to bulletproof hosting services such as Securehost and BEARHOST, PROSPERO has been a notable player in Russian cybercrime forums. This connection enhances Proton66’s ability to support various cyberattacks. Several malware families, including GootLoader and SpyNote, have exploited Proton66 to host their command-and-control servers and phishing pages, underlining its operational significance. In February 2025, revelations indicated that PROSPERO had been routing operations through networks managed by Kaspersky Lab, although Kaspersky firmly denies any collaboration. This historical backdrop provides insights into Proton66’s expanded role in recent cyberattacks. Exploitation of critical vulnerabilities such as CVE-2025-0108, CVE-2024-41713, CVE-2024-10914, CVE-2024-55591, and CVE-2025-24472 underscores the advanced threat landscape. Notably, an access broker known as Mora_001 exploited two Fortinet FortiOS flaws to deliver a new ransomware strain called SuperBlack, emphasizing the potency of such vulnerabilities in facilitating complex attacks.

Noteworthy Malware Campaigns and Exploitation Techniques

Trustwave’s findings highlight various malware campaigns associated with Proton66, revealing sophisticated techniques used in these attacks. Among the notable campaigns is the distribution of XWorm, StrelaStealer, and a ransomware known as WeaXor. One particularly concerning campaign involved compromised WordPress sites linked to the Proton66 IP address 91.212.166[.]21, which redirected Android users to phishing pages mimicking Google Play. These phishing pages deceived users into downloading malicious APK files. The redirection mechanism employed obfuscated JavaScript and implemented checks to exclude crawlers and VPN users, targeting French, Spanish, and Greek speakers. Another significant Proton66 activity involved malware deployment through a ZIP archive, which led to XWorm infiltration. This campaign specifically targeted Korean-speaking chat room users, employing a complex sequence starting from a Windows shortcut executing a PowerShell command, eventually downloading and running the XWorm binary. Additionally, Proton66 infrastructure was linked to a phishing campaign targeting German-speaking users with StrelaStealer, which communicated with a specific command-and-control (C2) IP address, further demonstrating the adaptability and range of Proton66-facilitated attacks.

Mitigation Strategies and Future Considerations

The WeaXor ransomware, a revised iteration of Mallox, was also discovered communicating with a Proton66 C2 server, posing significant risks to targeted organizations. In light of these threats, cybersecurity experts advocate for blocking all Classless Inter-Domain Routing (CIDR) ranges associated with Proton66 as well as Chang Way Technologies, a potentially related provider based in Hong Kong. This proactive measure aims to minimize the risk of cyber threats emanating from this infrastructure. Organizations must prioritize robust monitoring and advanced threat detection to mitigate potential vulnerabilities. Continuous updates to security protocols, alongside comprehensive training for personnel, are essential in staying ahead of evolving cyber threats. By focusing on these strategies, entities can better defend against the diverse range of attacks facilitated by Proton66 and similar malicious infrastructures.

Moving Forward

The global cybersecurity scene has been deeply affected by the misuse of Proton66, a Russian bulletproof hosting service. Since January 8, 2025, Trustwave SpiderLabs’ cybersecurity experts have witnessed a troubling rise in malicious activities linked to Proton66’s IP addresses, including mass scanning, credential brute-forcing, and exploitation attempts. Particularly, net blocks 45.135.232.0/24 and 45.140.17.0/24 have shown significant activity. Disturbingly, some of these IP addresses had no prior history of malicious use or had been inactive for several years, raising serious concerns about the growing capabilities of cybercriminals who are exploiting Proton66’s infrastructure. This development indicates an alarming shift in cyber threats, making it evident that these criminals are evolving and becoming more sophisticated. The use and abuse of such services highlight the need for stronger cybersecurity measures and more vigilant monitoring to counteract these emerging threats in the digital landscape.

Explore more

Hotels Must Rethink Recruitment to Attract Top Talent

With decades of experience guiding organizations through technological and cultural transformations, HRTech expert Ling-Yi Tsai has become a vital voice in the conversation around modern talent strategy. Specializing in the integration of analytics and technology across the entire employee lifecycle, she offers a sharp, data-driven perspective on why the hospitality industry’s traditional recruitment models are failing and what it takes

Trend Analysis: AI Disruption in Hiring

In a profound paradox of the modern era, the very artificial intelligence designed to connect and streamline our world is now systematically eroding the foundational trust of the hiring process. The advent of powerful generative AI has rendered traditional application materials, such as resumes and cover letters, into increasingly unreliable artifacts, compelling a fundamental and costly overhaul of recruitment methodologies.

Is AI Sparking a Hiring Race to the Bottom?

Submitting over 900 job applications only to face a wall of algorithmic silence has become an unsettlingly common narrative in the modern professional’s quest for employment. This staggering volume, once a sign of extreme dedication, now highlights a fundamental shift in the hiring landscape. The proliferation of Artificial Intelligence in recruitment, designed to streamline and simplify the process, has instead

Is Intel About to Reclaim the Laptop Crown?

A recently surfaced benchmark report has sent tremors through the tech industry, suggesting the long-established narrative of AMD’s mobile CPU dominance might be on the verge of a dramatic rewrite. For several product generations, the market has followed a predictable script: AMD’s Ryzen processors set the bar for performance and efficiency, while Intel worked diligently to close the gap. Now,

Trend Analysis: Hybrid Chiplet Processors

The long-reigning era of the monolithic chip, where a processor’s entire identity was etched into a single piece of silicon, is definitively drawing to a close, making way for a future built on modular, interconnected components. This fundamental shift toward hybrid chiplet technology represents more than just a new design philosophy; it is the industry’s strategic answer to the slowing