Adversaries rent cloud-based VPS infrastructure to establish anonymous, rapidly provisioned, and geographically distributed command-and-control nodes—exploiting the trust and ubiquity of major cloud providers.
MITRE ATT&CK • Enterprise • Sub-technique T1583.003
Virtual Private Servers represent the single most common infrastructure acquisition method used by adversaries worldwide. The ease of provisioning, combined with the inherent trust associated with major cloud providers, makes VPS-based infrastructure extremely difficult for defenders to block at scale. From nation-state APT groups to financially motivated cybercriminals, nearly every threat actor relies on rented VPS instances to anchor their operations.
VPS is the dominant infrastructure type for C2, payload delivery, and data exfiltration. Over 28,000 servers used by threat actors were tracked in 2024 alone, the vast majority being cloud VPS instances.
Bridewell CTI 2025 ReportMajor cloud providers (AWS, Azure, GCP, DigitalOcean) host millions of legitimate customers. Blocking VPS IP ranges would cause catastrophic collateral damage to normal business operations, giving adversaries persistent cover.
VPS instances can be created in under 5 minutes via API or web console and torn down just as quickly. This allows adversaries to rotate infrastructure faster than defenders can blacklist it.
A dedicated ecosystem of "bulletproof" VPS providers caters specifically to cybercriminals, offering minimal KYC requirements, cryptocurrency payments, and deliberate ignorance of abuse reports. Providers like Stark Industries Solutions and RouterHosting exemplify this market.
100+ Active Bulletproof ProvidersAdversaries spread VPS infrastructure across multiple countries and continents to complicate attribution, avoid jurisdictional takedowns, and maintain resilient multi-path C2 chains that survive individual node losses.
IP addresses from reputable cloud providers carry implicit trust, making it harder for firewalls and email filters to block traffic. In 2025, attackers were observed abusing VPS providers like Hyonix to compromise SaaS accounts via trusted infrastructure.
Darktrace / Infosecurity MagazineRenting a VPS for cyber operations means acquiring a virtual machine from a cloud service provider that serves as a remote, controllable server. Adversaries use these rented servers as the backbone of their attack infrastructure, hosting command-and-control frameworks, staging malware payloads, exfiltrating stolen data, and conducting reconnaissance against target networks.
Nadia Kozlova is a sophisticated threat operator working as part of a financially motivated cybercrime group. Over a period of 18 months, she built and maintained a resilient adversary infrastructure spanning 5 different cloud providers across 3 continents, paying exclusively with cryptocurrency to preserve anonymity.
Nadia began by registering anonymous accounts with AWS (Virginia), Leaseweb (Singapore), and Kaopu Cloud (Hong Kong) using forged identities and prepaid cryptocurrency wallets. She provisioned small VPS instances initially, gradually upgrading resources as her operations scaled. On the AWS instance, she deployed her primary Cobalt Strike command-and-control server behind a legitimate-looking domain registered through a privacy-protecting registrar. The Leaseweb instance served as a payload staging server, hosting weaponized documents and malware droppers disguised as software updates. The Kaopu Cloud VPS was configured with 500 GB of storage and high bandwidth for bulk data exfiltration.
When Dutch hosting provider Tier[.]Net suspended one of her reconnaissance servers after receiving an abuse complaint, Nadia demonstrated the core advantage of multi-provider resilience: within 25 minutes, she had provisioned a replacement VPS from Stark Industries Solutions in Moscow, migrated her scanning tools, and updated her C2 configuration to route through the new node. The victim organization never detected the switch.
How adversaries systematically acquire and configure VPS infrastructure for cyber operations. Understanding these steps is critical for building effective detection and response capabilities.
Adversaries research and select cloud providers that balance cost, performance, anonymity, and abuse tolerance. They often maintain accounts with 3–10 providers simultaneously.
Using cryptocurrency payments and forged or stolen identities, adversaries register accounts while minimizing personally identifiable information (PII) exposure.
Once accounts are created, adversaries rapidly provision VPS instances and harden them against detection by security scanners and cloud provider monitoring.
The VPS is transformed into an operational node by deploying command-and-control frameworks, malware toolkits, and exploitation utilities.
Before launching operations, adversaries verify that C2 channels are reachable, traffic blends with legitimate patterns, and no configuration errors could expose their infrastructure.
Maintain a pool of pre-configured spare VPS instances that can be activated immediately if primary infrastructure is detected or suspended, ensuring operational continuity.
VPS infrastructure provides the operational backbone for adversary campaigns, anonymity, speed, and resilience are paramount.
Understanding VPS acquisition patterns enables proactive detection and faster response to adversary infrastructure.
Key hunting hypotheses and detection strategies for identifying adversary-controlled VPS infrastructure in your environment.
Cross-reference all outbound connections from internal systems against commercial and open-source IP reputation feeds (AbuseIPDB, VirusTotal, Shodan). Flag any connections to VPS provider IP ranges that appear in threat reports within the past 90 days.
High PriorityCreate baseline profiles of which VPS providers (AWS, DigitalOcean, Linode, Vultr) your organization legitimately communicates with. Alert on any new VPS provider IP ranges appearing in outbound traffic that deviate from the established baseline.
High PriorityMonitor certificate transparency logs for newly issued TLS certificates associated with VPS IP addresses. Focus on certificates issued for domains with low character entropy (random-looking), recently registered domains, or certificates using free CAs (Let's Encrypt) for domains that mimic legitimate services.
Medium PriorityAlert when internal systems initiate connections to VPS providers in countries or regions with no legitimate business relationship. Pay special attention to connections to bulletproof hosting jurisdictions (Russia, Netherlands, Panama, offshore islands).
High PriorityAnalyze network traffic for regular beaconing patterns directed at VPS IP addresses. Adversary C2 servers hosted on VPS infrastructure often exhibit periodic check-in intervals (30s, 60s, 5min) that are detectable through statistical analysis of connection timing.
Medium PriorityFor identified VPS-based infrastructure, perform WHOIS lookups and passive DNS analysis to map the full infrastructure footprint. Adversaries often use consistent registration patterns (same registrars, same name servers, same registration dates) across multiple VPS-linked domains.
Low Priority (Intel Gathering)VPS acquisition is one component of the broader adversary infrastructure lifecycle. Understanding how it connects to domains, email accounts, and web services provides a complete picture of how threat actors build and maintain their operational platforms.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.