The United States sanctions Russian service provider Aeza Group to combat encryption crime infrastructure.

U.S. Sanctions Russian Service Provider Aeza Group

Recently, the U.S. Department of the Treasury's Office of Foreign Assets Control imposed sanctions on the Russian internet service provider Aeza Group and its related entities. The company is accused of providing hosting services for ransomware and information theft tools, thereby supporting cybercriminal activities.

The scope of this sanction includes Aeza Group itself, its UK front company, two Russian subsidiaries, and four senior executives. At the same time, a cryptocurrency wallet address associated with the company has also been added to the sanctions list.

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

Bradley T. Smith, Acting Deputy Secretary of the U.S. Treasury, stated that cybercriminals heavily rely on bulletproof hosting service providers like Aeza Group to carry out destructive attacks, steal technology, and conduct illegal drug transactions. He emphasized that the U.S. will work closely with international partners to continuously combat the key nodes and infrastructure that support this criminal ecosystem.

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

Aeza Group is a bulletproof hosting service provider headquartered in St. Petersburg. For a long time, the company has provided dedicated servers and anonymous hosting services to several well-known cybercrime groups, including information theft tool operators Lumma and Meduza, ransomware groups BianLian and RedLine, and the Russian darknet drug market Blacksprut. These organizations have repeatedly targeted the U.S. defense industry and global technology companies.

The Russian service provider Aeza Group behind hackers, the dark web, and drug markets is sanctioned

Hacker, dark web, and drug market service provider Aeza Group from Russia sanctioned

On-chain analysis shows that the sanctioned cryptocurrency wallet address has been active since 2023, receiving over $350,000 in USDT in total. This address has interacted with multiple well-known trading platforms and OTCs, suspected of being used for money laundering. In addition, it is also associated with other sanctioned entities, information theft service platforms, and dark web drug markets.

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

It is worth noting that despite the sanctions, Aeza Group is still actively responding. On the day the sanctions were announced, the company created new backup websites and shared these URLs with users through social media to ensure continuity of service.

This sanctions action marks a shift by global regulators in expanding the scope of their crackdown from direct attackers to providers of technological infrastructure that support criminal activities. For businesses, exchanges, and service providers, strengthening customer identification and transaction monitoring has become increasingly important to avoid engaging in business with high-risk entities, thereby mitigating potential sanctions risks.

Russian service provider Aeza Group behind hackers, dark web, and drug markets sanctioned

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 9
  • Share
Comment
0/400
StableGeniusDegenvip
· 15h ago
Are you playing with the sanctions trap again? It's useless.
View OriginalReply0
ForeverBuyingDipsvip
· 07-31 03:46
Sanction after sanction, can we still do business?
View OriginalReply0
ChainChefvip
· 07-30 13:44
looks like uncle sam's finally cleaning up the kitchen... tasting some sour russian hosting soup rn tbh
Reply0
NoodlesOrTokensvip
· 07-30 13:26
It turns out that the chaotic operations all day long have been caught.
View OriginalReply0
OnChain_Detectivevip
· 07-30 13:23
pattern analysis suggests classic obfuscation tactics... typical for these bulletproof hosts tbh
Reply0
NotSatoshivip
· 07-30 13:21
Hot blockchain networks are being closely watched.
View OriginalReply0
Anon32942vip
· 07-30 13:20
This matter has gotten big.
View OriginalReply0
MechanicalMartelvip
· 07-30 13:05
Can you finish the sanctions quickly? Don't delay my transfer.
View OriginalReply0
just_here_for_vibesvip
· 07-30 13:00
Again pumped onto the list haha
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)