HomeCII/OTNotorious Malware, Spam Host "Prospero" Moves to Kaspersky Lab – Krebs on...

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security Notorious Malware, Spam Host Prospero Moves to Kaspersky Lab – Krebs on Security

Published on

spot_img

Kaspersky Lab, a Russian antivirus and security firm, has been found to be involved in routing the operations of Prospero OOO, a notorious provider of abuse-friendly “bulletproof” web hosting for cybercriminals. Security experts have identified Prospero as a persistent source of malicious software, botnet controllers, and phishing websites, with connections to bulletproof services advertised on Russian cybercrime forums.

Prospero, operating under the names Securehost and BEARHOST, has a reputation for ignoring legal demands and abuse complaints, making it a popular choice for cybercriminal activities. The service provider openly advertises its services for hosting botnets, malware, phishing, and other illegal tasks, claiming to completely ignore abuse complaints from organizations like Spamhaus.

Intrinsec, a French security firm, discovered that Prospero has been hosting control servers for ransomware gangs and malware operations such as SocGholish and GootLoader. These operations often lead to serious cyber intrusions, including ransomware attacks. BEARHOST prides itself on evading blocking by Spamhaus and other organizations.

Recently, Spamhaus observed that Prospero was routing its operations through networks operated by Kaspersky Lab in Moscow. Kaspersky Lab, known for its antivirus and security software, has faced controversies in the past, such as being banned by the US Department of Homeland Security due to concerns about potential ties to the Russian government.

Despite Kaspersky’s reputable background in malware research, the company’s association with Prospero raises suspicions. The ban on Kaspersky software in the US highlights concerns about the Russian government potentially leveraging the company for intelligence gathering.

Phishing data from the Interisle Consulting Group revealed that Prospero had a higher spam score than any other provider, indicating a significant presence of spambot hosts. It remains unclear why Kaspersky is providing transit to Prospero, with speculations ranging from DDoS protection services to potential collaborations for cybercriminal activities.

Experts like Doug Madory from Kentik and Zach Edwards from Silent Push have raised concerns about Kaspersky’s involvement with a bulletproof hosting provider like Prospero. While it’s possible that Prospero is simply purchasing DDoS protection services from Kaspersky, the association between a reputable security firm and a provider known for hosting cybercriminal activities raises ethical and security implications.

As the investigation into the relationship between Kaspersky Lab and Prospero continues, the cybersecurity community remains vigilant about the potential risks and implications of such partnerships in the fight against cybercrime. The collaboration between a well-known security firm and a bulletproof hosting provider highlights the complexity and challenges in addressing cyber threats in the digital landscape.

Source link

Latest articles

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

Impact of Data Centers as Military Targets

Rethinking Business Continuity Plans: A Pressing Need for CIOs Amid Cloud Resilience Challenges Contextualizing Recent...

12 Cyber Industry Trends Unveiled at RSAC 2026

Reflections on RSA 2026: A Transformative Event in Cybersecurity As the curtains draw on the...

More like this

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

Impact of Data Centers as Military Targets

Rethinking Business Continuity Plans: A Pressing Need for CIOs Amid Cloud Resilience Challenges Contextualizing Recent...