By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
Computing

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

News Room
Last updated: 2026/01/15 at 4:50 AM
News Room Published 15 January 2026
Share
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
SHARE

Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses.

The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that has allowed it to confiscate the malicious infrastructure and take the illicit service (“redvds[.]com”) offline.

“For as little as US $24 a month, RedVDS provides criminals with access to disposable virtual computers that make fraud cheap, scalable, and difficult to trace,” said Steven Masada, assistant general counsel of Microsoft’s Digital Crimes Unit. “Since March 2025, RedVDS‑enabled activity has driven roughly US $40 million in reported fraud losses in the United States alone.”

Crimeware-as-a-service (CaaS) offerings have increasingly become a lucrative business model, transforming cybercrime from what once was an exclusive domain that required technical expertise into an underground economy where even inexperienced and aspiring threat actors can carry out complex attacks quickly and at scale.

These turnkey services span a wide spectrum of modular tools, ranging from phishing kits to stealers to ransomware, effectively contributing to the professionalization of cybercrime and emerging as a catalyst for sophisticated attacks.

Microsoft said RedVDS was advertised as an online subscription service that provides cheap and disposable virtual computers running unlicensed software, including Windows, so as to empower and enable criminals to operate anonymously and send high‑volume phishing emails, host scam infrastructure, pull off business email compromise (BEC) schemes, conduct account takeovers, and facilitate financial fraud.

Specifically, it served as a hub for purchasing unlicensed and inexpensive Windows-based Remote Desktop Protocol (RDP) servers with full administrator control and no usage limits through a feature-rich user interface. RedVDS, besides providing servers located in Canada, the U.S., France, the Netherlands, Germany, Singapore, and the U.K., also offered a reseller panel to create sub-users and grant them access to manage the servers without having to share access to the main site.

Cybersecurity

An FAQ section on the website noted that users can leverage its Telegram bot to manage their servers from within the Telegram app instead of having to log in to the site. Notably, the service did not maintain activity logs, making it an attractive choice for illicit use.

According to snapshots captured on the Internet Archive, RedVDS was advertised as a way to “increase your productivity and work from home with comfort and ease.” The service, the maintainers said on the now-seized website, was first founded in 2017 and operated on Discord, ICQ, and Telegram. The website was launched in 2019.

“RedVDS is frequently paired with generative AI tools that help identify high‑value targets faster and generate more realistic, multimedia message email threads that mimic legitimate correspondences,” the company said, adding it “observed attackers further augment their deception by leveraging face-swapping, video manipulation, and voice cloning AI tools to impersonate individuals and deceive victims.”

RedVDS tool infrastructure

Since September 2025, attacks fueled by RedVDS are said to have led to the compromise or fraudulent access of more than 191,000 organizations worldwide, underscoring the prolific reach of the service.

The Windows maker, which is tracking the developer and maintainer of RedVDS under the moniker Storm-2470, said it has identified a “global network of disparate cybercriminals” leveraging the infrastructure provided by the criminal marketplace to strike multiple sectors, including legal, construction, manufacturing, real estate, healthcare, and education in the U.S., Canada, U.K., France, Germany, Australia, and countries with substantial banking infrastructure targets.

RedVDS attack chain

Some of the notable threat actors include, Storm-2227, Storm-1575, Storm-1747, and phishing actors who used the RaccoonO365 phishing kit prior to its disruption in September 2025. The infrastructure was specifically used to host a toolkit comprising both malicious and dual-use software –

  • Mass spam/phishing email tools like SuperMailer, UltraMailer, BlueMail, SquadMailer, and Email Sorter Pro/Ultimate
  • Email address harvesters like Sky Email Extractor to scrape or validate large numbers of email addresses
  • Privacy and OPSEC tools like Waterfox, Avast Secure Browser, Norton Private Browser, NordVPN, and ExpressVPN
  • Remote access tools like AnyDesk

One threat actor is said to have used the provisioned hosts to programmatically (and unsuccessfully) send emails via Microsoft Power Automate (Flow) using Excel, while other RedVDS users leveraged ChatGPT or other OpenAI tools to craft phishing lures, gather intelligence about organizational workflows to conduct fraud, and distribute phishing messages designed to harvest credentials and take control of victims’ accounts.

RedVDS offerings

The end goal of these attacks is to mount highly convincing BEC scams, permitting the threat actors to inject themselves into legitimate email conversations with suppliers and issue fraudulent invoices to trick targets into transferring funds to a mule account under their control.

Interestingly, its Terms of Service prohibited customers from using RedVDS for sending phishing emails, distributing malware, transferring illegal content, scanning systems for security vulnerabilities, or engaging in denial-of-service (DoS) attacks. This suggests the threat actors’ apparent effort to limit or escape liability.

Cybersecurity

Microsoft further said it “identified attacks showing thousands of stolen credentials, invoices stolen from target organizations, mass mailers, and phish kits, indicating that multiple Windows hosts were all created from the same base Windows installation.”

“Additional investigations revealed that most of the hosts were created using a single computer ID, signifying that the same Windows Eval 2022 license was used to create these hosts. By using the stolen license to make images, Storm-2470 provided its services at a substantially lower cost, making it attractive for threat actors to purchase or acquire RedVDS services.”

The virtual Windows cloud servers were generated from a single Windows Server 2022 image, through RDP. All identified instances used the same computer name, WIN-BUNS25TD77J. It’s assessed that Storm-2470 created one Windows virtual machine (VM) and repeatedly cloned it without changing the system identity.

The cloned Windows instances are created on demand using Quick Emulator (QEMU) virtualization technology combined with VirtIO drivers, with an automated process copying the master virtual machine (VM) image onto a new host every time a server is ordered in exchange for a cryptocurrency payment. This strategy made it possible to spin up fresh RDP hosts within minutes, allowing cybercriminals to scale their operations.

“Threat actors used RedVDS because it provided a highly permissive, low-cost, resilient environment where they could launch and conceal multiple stages of their operation,” Microsoft said. “Once provisioned, these cloned Windows hosts gave actors a ready‑made platform to research targets, stage phishing infrastructure, steal credentials, hijack mailboxes, and execute impersonation‑based financial fraud with minimal friction.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Solo Nutrient Your Brain, Bone, & Heart Health Need The Solo Nutrient Your Brain, Bone, & Heart Health Need
Next Article Mistral Releases OCR 3 With Improved Accuracy on Handwritten and Structured Documents Mistral Releases OCR 3 With Improved Accuracy on Handwritten and Structured Documents
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Are You Still Using Bleach? A Laundry Expert Explains Why That's a Big Mistake
Are You Still Using Bleach? A Laundry Expert Explains Why That's a Big Mistake
News
Linux Patches Bring Mainline Kernel Support For The ASUS IPMI Expansion Card
Linux Patches Bring Mainline Kernel Support For The ASUS IPMI Expansion Card
Computing
Garmin’s 4.5-star Fenix 7X Pro Solar sees a price drop in the January sales
Garmin’s 4.5-star Fenix 7X Pro Solar sees a price drop in the January sales
Gadget
MongoDB combines database and embedding models for simplified AI development –  News
MongoDB combines database and embedding models for simplified AI development – News
News

You Might also Like

Linux Patches Bring Mainline Kernel Support For The ASUS IPMI Expansion Card
Computing

Linux Patches Bring Mainline Kernel Support For The ASUS IPMI Expansion Card

3 Min Read
Stellantis-backed Leapmotor becomes the first automaker to refund ADAS subscription fees · TechNode
Computing

Stellantis-backed Leapmotor becomes the first automaker to refund ADAS subscription fees · TechNode

1 Min Read
The Hidden Cost of Downtime: A FinOps and Insurance Perspective | HackerNoon
Computing

The Hidden Cost of Downtime: A FinOps and Insurance Perspective | HackerNoon

6 Min Read
4 Outdated Habits Destroying Your SOC’s MTTR in 2026
Computing

4 Outdated Habits Destroying Your SOC’s MTTR in 2026

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?