Microsoft has announced a coordinated legal action with authorities in the United States, United Kingdom, and Germany to disrupt RedVDS, a global cybercrime subscription service responsible for an estimated $40 million in fraud losses. The operation dismantled infrastructure that hosted approximately 2,600 virtual machines sending over 1 million phishing emails daily.

Operation overview

MetricValue
Estimated fraud losses$40 million+ (US alone)
Virtual machines seized2,600
Daily phishing emails1 million+
Compromised organizations191,000+
Service price$24/month
Microsoft civil action number35th against cybercrime

How RedVDS worked

RedVDS operated as a bulletproof hosting service, providing cybercriminals with disposable virtual infrastructure designed to evade detection and attribution. The service advertised cheap, disposable Windows-based Remote Desktop Protocol (RDP) servers with full administrator control.

Service features

CapabilityBenefit to criminals
Disposable VMsFresh infrastructure when servers get blocked
Full admin controlComplete system access
Unlicensed WindowsNo legitimate licensing trail
AnonymityCustomer identity protection
Rapid deploymentNew attack infrastructure in minutes
ScalabilitySupport for high-volume operations
Abuse toleranceNo takedowns for malicious content

For just $24 per month, customers received access to virtual machines pre-configured for fraudulent operations.

Technical signature

Microsoft identified RedVDS infrastructure through a distinctive pattern:

IndicatorDetails
Base imageWindows Server 2022
Computer nameWIN-BUNS25TD77J (same for all VMs)
ConfigurationIdentical across all customer VMs
Detection methodConsistent artifact across attacks

The use of a single Windows Server 2022 image with identical computer names allowed Microsoft to link disparate attacks to the same infrastructure.

Threat actor: Storm-2470

Microsoft tracks the primary RedVDS operator as Storm-2470, a threat actor involved in:

ActivityRole
RedVDS marketplace operationPrimary operator
Criminal customer recruitmentMarketing and sales
Bulletproof hosting managementInfrastructure
Fraud proceeds launderingFinancial operations

While no individuals have been publicly named, Microsoft continues working with law enforcement to identify the people running and profiting from the scheme.

Criminal use cases

Phishing operations

The primary use case was high-volume phishing campaigns:

CapabilityScale
Mass email distribution1M+ daily
Credential harvesting pagesThousands hosted
Brand impersonation sitesMajor companies targeted
Infrastructure rotationFresh IPs when blocked

Real estate wire fraud

One of the fastest-growing cyber fraud categories, enabled by RedVDS infrastructure:

StepAction
1Compromise real estate agent or title company email
2Monitor for pending transactions
3Send fraudulent wire instructions to buyers
4Divert funds to criminal-controlled accounts
5Launder through multiple hops

Business email compromise

RedVDS supported BEC operations including:

Attack typeInfrastructure provided
Spoofed email domainsSMTP servers
Fake invoice portalsWeb hosting
Email account takeoverCredential harvesting
Fraudulent payment redirectionLanding pages

Victims and co-plaintiffs

Two organizations joined Microsoft as co-plaintiffs, illustrating the real-world impact:

H2-Pharma

DetailInformation
LocationAlabama
IndustryPharmaceutical
Loss$7.3 million
Attack typeBusiness email compromise
TransactionReal estate wire fraud

The $7.3 million H2-Pharma loss illustrates how wire fraud works:

  1. Attackers compromised email accounts monitoring real estate transactions
  2. Identified pending $7.3 million property purchase
  3. Sent fraudulent wire instructions impersonating legitimate parties
  4. Funds transferred to criminal accounts before discovery
  5. Money laundered through multiple hops

Gatehouse Dock Condominium Association

DetailInformation
LocationFlorida
TypeCondominium association
Loss~$500,000
Attack typeBEC targeting resident funds

Coordinated takedown

Participants

OrganizationRole
Microsoft Digital Crimes UnitLegal action, technical analysis
German Federal Criminal Police (BKA)Server seizure
UK National Crime Agency (NCA)Investigation support
UK High CourtLegal authorization (first time for DCU)
EuropolInternational coordination
FBIUS investigation
US Attorney’s OfficeProsecution support

Actions taken

ActionResult
Domain seizureRedVDS marketplace offline
VM seizure2,600 VMs captured
Customer recordsTransaction data obtained
UK court actionFirst Microsoft DCU action in UK courts
Ongoing investigationCriminal prosecutions expected

This action marks the first time Microsoft’s Digital Crimes Unit has used UK courts to disrupt cybercrime infrastructure, demonstrating expanding legal tools for private-sector disruption efforts.

JurisdictionLegal mechanism
United StatesCivil RICO, Computer Fraud and Abuse Act
United KingdomHigh Court injunction (new for DCU)
GermanyCriminal seizure orders

Technical infrastructure

RedVDS infrastructure included:

ComponentPurpose
Phishing kitsPre-built credential harvesting templates
SMTP serversHigh-volume email delivery
VPN servicesCustomer anonymization
Domain registrationBulk disposable domains
Hosting automationRapid VM deployment
Payment processingCryptocurrency and other methods

The service maintained relationships with upstream hosting providers who either failed to detect or ignored abuse complaints.

Impact on fraud ecosystem

Bulletproof hosting services are critical infrastructure for cybercrime. By providing reliable, anonymous platforms, they enable:

Crime typeRedVDS role
PhishingEmail servers, landing pages
Wire fraudBEC infrastructure
RansomwareC2 servers, payment processing
Credential theftHarvesting page hosting
Brand impersonationFake websites
Account takeoverAttack infrastructure

Disrupting these services has outsized impact because they support multiple criminal operations simultaneously.

Microsoft Digital Crimes Unit history

Action numberTargetYear
35RedVDS2026
34Storm-11522023
33Zloader2022
32ZLoader2022
PreviousBotnets, nation-state infrastructure2010-2021

Microsoft’s DCU has conducted dozens of similar operations using civil legal remedies to complement law enforcement efforts.

Recommendations

For financial transactions

ControlPurpose
Out-of-band verificationCall known numbers to confirm wire details
Email securityMFA, monitoring for account compromise
Payment controlsDual authorization for large transfers
Employee trainingWire fraud awareness
Callback proceduresVerify changes to payment instructions

For organizations generally

ActionBenefit
Monitor brand impersonationDetect fake sites early
Report abuse promptlyAccelerate takedowns
Industry information sharingCollective defense
Takedown servicesProfessional impersonation response
Email authenticationDMARC, DKIM, SPF enforcement

For real estate transactions

ControlImplementation
Wire verification callsUse known phone numbers, not email-provided
Closing procedure trainingEducate all parties on fraud risks
Email monitoringAlert on account compromise indicators
Payment confirmationVerify receipt before releasing property

Indicators of compromise

RedVDS infrastructure signatures

IndicatorValue
Computer nameWIN-BUNS25TD77J
Base imageWindows Server 2022
Deployment patternIdentical configurations

Context

The RedVDS takedown demonstrates effective public-private partnership in disrupting cybercrime infrastructure. The involvement of UK courts expands the legal toolkit available to Microsoft’s Digital Crimes Unit, potentially enabling faster action in future cases.

However, bulletproof hosting remains abundant—new services emerge continuously to replace those taken down. RedVDS is likely to be succeeded by similar operations serving the same criminal customer base.

RealityImplication
Service will be replacedEcosystem is resilient
Customer data seizedProsecutions may follow
Friction createdCriminals must rebuild
Intelligence gatheredFuture investigations enabled

Sustained pressure on these enablers is necessary to increase friction for cybercriminals. Each disruption forces criminals to rebuild infrastructure, find new providers, and accept operational delays—even if the underlying criminal ecosystem persists.

The $40 million in documented losses represents only US victims. Global fraud enabled by RedVDS is likely significantly higher, making this one of the more impactful cybercrime infrastructure takedowns in recent years.