Treasury sanctions hosting provider for crypto cybercrimes

来源 Cryptopolitan

U.S. Treasury’s Office of Foreign Assets Control sanctions Russia-based hosting provider Aeza Group LLC for enabling cybercriminal operations.

The action includes cryptocurrency address designation while targeting critical infrastructure supporting ransomware attacks and data theft activities globally.

OFAC sanctions Aeza Group network for bulletproof hosting services

On July 1, 2025, Aeza Group LLC, a Russia-based bulletproof hosting company, and its executives were sanctioned by the U.S. Department of Treasury’s Office of Foreign Assets Control for aiding cybercrime. The penalties cover both cyber-related and CAATSA Russia-related agencies, according to Chainalysis.

The whole global network, including Aeza International Ltd. in the UK and other affiliated businesses, is covered by OFAC’s action in addition to the main Russian firm. This comprehensive approach addresses the global scope of modern cybercrime infrastructure operations spanning multiple jurisdictions.

The designation continues OFAC’s focus on disrupting service providers who enable massive cyber threats by targeting essential infrastructure that fraudsters use to host illicit information. This action follows the February 2025 designation of ZServers.

Aeza Group provided bulletproof hosting services that allowed cybercriminals to conduct ransomware attacks, data theft, and other malicious cyber activities while maintaining operational security. The company’s services included dedicated servers advertised from Moscow-based locations, providing resilient hosting infrastructure for criminal operations.

The sanctions target the supply chain supporting cybercrime operations rather than pursuing individual threat actors after attacks occur. This addresses the foundational infrastructure that makes large-scale cybercriminal activities possible.

Treasury flags addresses linked to Aeza payment infrastructure

OFAC’s designation includes one TRON cryptocurrency address TU4tDFRvcKhAZ1jdihojmBWZqvJhQCnJ4F associated with Aeza Group’s payment infrastructure for illicit hosting services. On-chain analysis reveals that Aeza Group relied on payment processors to receive payments for hosting services, obscuring the traceability of customer deposits through intermediary systems.

Treasury cracks down on hosting service, crypto addresses flagged.
Flow of funds from Aeza: Chainalysis

As an administrative wallet, the specified address manages cash-outs from payment processors, transfers money to other cryptocurrency exchanges, and occasionally gets paid directly for Aeza’s services. This wallet received more than $350,000 in cryptocurrency while cashing out at multiple deposit addresses across different exchanges.

The deposit addresses that Aeza utilized, according to Chainalysis Reactor study, also received money via an escrow provider for transactions on gaming platforms and the Garantex exchange. Additional connections include a darknet vendor selling infostealer malware, which breaches computer systems to steal sensitive user information.

This vendor was probably a client of Aeza since regular payments from the infostealer vendor wallet to Aeza’s exchange deposit address match Aeza’s hosting service pricing structures. The payment patterns provide evidence of the hosting provider’s direct involvement with malicious actors operating infostealers and other cybercriminal tools.

The detected TRON address has been marked by Chainalysis in their product suite, and they are still keeping an eye out for more addresses linked to Aeza and other reliable hosting services.

Targeting of cybercrime infrastructure disrupts criminal supply chains

Instead of going against specific threat actors after assaults have already taken place, OFAC’s action against Aeza Group targets the core infrastructure that enables large-scale cybercrime operations. This approach attacks the supply chain supporting cybercriminal activities by focusing on service providers that facilitate ongoing malicious operations.

Bulletproof hosting services like Aeza Group offer customized services resistant to takedown and law enforcement actions, providing high-level infrastructure for criminal use. The services facilitate constant access to hosting infrastructure needed for ransomware attacks, data thievery operations, and other malicious cyber activities.

Sanctions approach seeks to disrupt critical infrastructure dependencies used by cybercriminals for hosting malicious content and remaining online. Disrupting hosting services is meant by the authorities to make operationally difficult for cybercriminal groups that depend on robust infrastructure for running their operations.

This enforcement action follows similar disruptions of cybercrime infrastructure, including the February 2025 designation of ZServers, reflecting ongoing government dedication to disrupting service providers enabling criminality. This is a strategy of systemic disruption, rather than response to individual attacks.

KEY Difference Wire helps crypto brands break through and dominate headlines fast

免责声明:仅供参考。 过去的表现并不预示未来的结果。
placeholder
日元汇率将升值10%?摩根士丹利:2026年美元/日元将跌至140美日货币政策分化仍存,加上日本政府干预威胁,日元未来走势或出现反转。
作者  Alison Ho
2025 年 11 月 25 日
美日货币政策分化仍存,加上日本政府干预威胁,日元未来走势或出现反转。
placeholder
人民币汇率强劲升值!高盛:国际化加速,2026年人民币兑美元升至6.85美元兑在岸人民币(USD/CNY)跌至7.0824,美元兑离岸人民币(USD/CNH)跌至7.0779,双双创一年多新低。
作者  Alison Ho
2025 年 11 月 26 日
美元兑在岸人民币(USD/CNY)跌至7.0824,美元兑离岸人民币(USD/CNH)跌至7.0779,双双创一年多新低。
placeholder
日元汇率巨震!日本央行加息25基点,2026年继续加?决议公布后,美元/日元(USD/JPY)短线下挫后拉升,突破156。行长讲话期间继续拉升,逼近157关口。
作者  Alison Ho
2025 年 12 月 19 日
决议公布后,美元/日元(USD/JPY)短线下挫后拉升,突破156。行长讲话期间继续拉升,逼近157关口。
placeholder
澳洲央行加息25基点,澳元汇率狂飙!未来走势如何?澳洲央行2026年内大概率会再次加息,澳元/美元涨势或延续。
作者  Alison Ho
2 月 03 日 周二
澳洲央行2026年内大概率会再次加息,澳元/美元涨势或延续。
placeholder
日本大选结果将出炉,高市早苗大获全胜?警惕日元贬值破160若高市早苗大获全胜,日元汇率可能再度重回160关口。小心日本当局干预。
作者  Alison Ho
2 月 04 日 周三
若高市早苗大获全胜,日元汇率可能再度重回160关口。小心日本当局干预。
goTop
quote