{"id":3162,"date":"2026-02-26T12:00:00","date_gmt":"2026-02-26T20:00:00","guid":{"rendered":"https:\/\/celacampaig.wpenginepowered.com\/?p=3162"},"modified":"2026-03-02T11:17:04","modified_gmt":"2026-03-02T19:17:04","slug":"redvds","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/redvds\/","title":{"rendered":"RedVDS and the Invisible Infrastructure of Modern Cybercrime"},"content":{"rendered":"
When cybercriminals breached the email network at H2-Pharma, an Alabama-based pharmaceutical company, nobody knew it had happened. <\/p>
Most likely it was a phishing attack, an email scam that caught an employee off guard and tricked them into feeding their credentials into a malicious website designed to look legitimate, inadvertently handing a criminal the keys to their inbox. <\/p>
H2 wasn’t flooded with spam or crippled by malware. But from that day on, bad actors were in the network, biding their time and monitoring email exchanges—particularly those of Josh B., Vice President of Commercial Operations, who oversaw H2’s relationships with vendors. <\/p>
In April 2025, Josh B. reached out to Cheplapharm, a global pharmaceutical company headquartered in Germany that has been working with H2 for more than a decade. Josh B. was considering a change to H2’s payment processes, moving from wire transfers to ACH payments to save money on banking fees. He emailed a trusted contact at the company, a sales manager, to find out if the change was feasible. <\/p>
Josh B. didn’t know it, but that was when the cybercriminals saw their opportunity. <\/p>
The sales manager replied to Josh B.’s email, saying that Cheplapharm couldn’t accept ACH payments because it didn’t have a US bank account. But soon after, Josh B. got another email from his contact—same subject line, same email signature—saying that he’d checked with Cheplapharm’s finance and accounting teams and found that they could take ACH payments after all. The sales rep attached the details for a US-based account. <\/p>
It wasn’t unusual for Cheplapharm to change course like this, so the request didn’t seem like a red flag to Josh B. Still, he was cautious—he transferred $0.44 to the account to make sure payments were routed properly. The sales manager confirmed receipt of the transfer. Josh B., reassured, made another transfer, this time for several million dollars. A few weeks later, he made another seven-figure payment to the account. <\/p>
The problem was, Josh B. wasn’t communicating with a real sales manager at Cheplapharm. He was emailing the cybercriminals who’d been watching his communications, waiting for just this moment. <\/p> On May 20, Josh B. got another email from his sales contact—this time inquiring why Cheplapharm hadn’t received payment from H2. Josh B. pointed to the ACH transfers, but the real sales manager knew nothing about those payments, and by that time the imposter was long gone. The bank account where Josh B. sent the payments had been shut down. H2 was out more than $7.3 million—money it needed to pay Cheplapharm in order to provide medications its customers depend on. <\/p> The type of attack that hit H2-Pharma is known as business email compromise (BEC), or payment diversion fraud, and it’s not an easy scam to pull off. It requires time, patience, and sophisticated social engineering. It also requires specialized technology. A BEC scam is a multi-stage attack, and each phase uses different tools and technical infrastructure.<\/p> The initial stage involves gaining access to an email account, often through phishing techniques. Other tactics may include scraping the web for vast lists of addresses to target, deploying mass-mailing tools to send out thousands of emails, and hosting legitimate-looking websites intended to harvest user credentials.<\/p> Fraudsters then use the stolen credentials to log into the victim’s account and search for supplier details, financial discussions, and pending invoices. They copy email signatures and monitor threads to find a moment when a bill needs to be paid, then slip into an ongoing conversation, impersonating the real vendor to convince the victim to route payment to a different account. Increasingly, they use AI voice cloning and face-swapping technology to manipulate victims.<\/p> After defrauding their target the attacker disappears, erasing their tracks before the victim realizes what has happened.<\/p> This type of fraud might be too technically demanding for the average cyber thief to manage on their own, but cybercrime today is a booming underground business with a wide range of “Cybercrime-as-a-Service” (CaaS)<\/a> providers selling ready-made tools and services.<\/p> Until recently, criminals could subscribe to a service that provided the necessary tool to conduct attacks such as BEC for as little as $24 a month: a platform called RedVDS.<\/p> RedVDS provided cheap, disposable virtual computers (VDS stands for Virtual Dedicated Server) that were used as launchpads for a wide range of cyber-enabled financial fraud. RedVDS fueled a surge in worldwide fraud that has cost victims more than $66 million since 2019. These figures represent only confirmed cases—actual worldwide losses may be much higher.<\/p> Outsourcing cyberattacks to CaaS vendors like RedVDS not only makes it easier to launch sophisticated fraud schemes but also helps perpetrators evade detection. “Cybercriminals don’t want to use their own infrastructure,” says Donal Keating, Director of Innovation and Research at Microsoft. “Nobody uses their own car to rob a bank.”<\/p> RedVDS provided anonymity, taking payment in cryptocurrency and eliminating usage logs. Subscribers could log on remotely using a VPN to hide their real location while they gathered information over time. RedVDS was tailor-made for cybercrime, but it wasn’t malware; it was simply the infrastructure that facilitated cyberattacks. “This infrastructure layer is a critical enabler of modern cybercrime cases,” says Alexandra Gerst, Senior Corporate Counsel with Microsoft’s Digital Crimes Unit (DCU).<\/p> RedVDS also allowed criminals to wipe their server to remove evidence of wrongdoing. Deleted data can be recovered, but wiping a server overwrites the entire disk with a fresh operating system and a new IP address, leaving no trace of prior activity. RedVDS subscribers could wipe and reinstall their system in a matter of minutes. <\/p> Microsoft tracks more than 100 trillion security signals daily to detect malicious activity, and the company’s threat analysts began to see a pattern: Thousands of attacks on customers worldwide were coming from different Windows hosts using the same computer ID. That ID mapped to a single Windows 2022 Eval installation, a “try before you buy” license that had been pirated. When the DCU’s investigators began to follow the stolen ID, they learned that users received receipts from RedVDS. <\/p> The operators behind RedVDS, a group Microsoft tracks as Storm-2470, were cloning the same Windows virtual machine over and over again without changing the system ID. <\/p> “At the end of the day, cybercriminals are just like the rest of us—they get a little bit lazy,” says Sean Ensz, Principal Investigator with the DCU. RedVDS facilitated scams that preyed on human error, yet in the end, it was the criminals’ own human error that led to the takedown of the enterprise. <\/p> Investigators with the DCU went undercover as subscribers to RedVDS, learning how the platform worked and tracing cryptocurrency payments. They discovered that RedVDS was using a fictitious business entity that claimed to operate in the Bahamas, but the address of the business turned out to belong to a building at the University of the Bahamas that had been demolished in 2024.<\/p> Once they had traced the criminal activity to a specific group, the DCU knew exactly how to cut off RedVDS from victims, but it wasn’t what TV and movies might lead you to expect. There was no feverish hacking to neutralize the technology; no dramatic raid on an underground criminal lair. The DCU simply wields the power of the law<\/a>. <\/p> The perpetrators were not only using Microsoft’s branding to defraud victims, they were violating the terms of service that governed the stolen Windows license. The misuse of Microsoft’s intellectual property provided legal grounds for the DCU to file a civil lawsuit, asking US courts for permission to seize the two domains RedVDS used to host its marketplace and customer portal. The case moved swiftly, and the DCU quickly took down redvds.com and redvds.pro, severing RedVDS from its cybercriminal customers. <\/p>
The infrastructure that powers cybercrime<\/h2>


The thread that unraveled the RedVDS enterprise<\/h2>
How the DCU pulled the plug on RedVDS<\/h2>
