Mayura Kathir
2025-09-02 06:05:00
gbhackers.com
In mid-2025, a coalition of Ukraine-based autonomous systems orchestrated unprecedented brute-force and password-spraying campaigns against exposed SSL VPN and Remote Desktop Protocol (RDP) services, overwhelming security defenses and highlighting the growing sophistication of state-linked cyber-infrastructure.
Over a concentrated three-day period in July 2025, the network operated under AS211736 (“FDN3”), allocated to FOP Dmytro Nedilskyi, unleashed more than 1.3 million login attempts against corporate VPN and RDP endpoints.
Security researchers attribute these coordinated attacks to an interconnected cluster of Ukrainian autonomous systems—VAIZ-AS (AS61432), E-RISHENNYA-ASN (AS210950), and FDN3 (AS211736)—which routinely exchange IP prefixes with TK-NET (AS210848) in Seychelles to evade blocklisting.
All four networks originated simultaneously in August 2021 and share routing through IP Volume Inc. (AS202425), a Seychelles-based front for the notorious Dutch bulletproof hosting provider Ecatel.
The campaign’s timings and tactics bore hallmarks of emerging Ransomware-as-a-Service (RaaS) groups, which rely on low-and-slow credential stuffing to gain initial network footholds.
On July 6, 2025, the FDN3 prefix 88.210.63.0/24 began firing waves of login attempts across thousands of VPN appliances and RDP servers, peaking at over 110 000 hits per individual IP address.
Logging clusters revealed near-uniform distribution of attempts between SSL VPN ports (TCP 443 and 8443) and RDP (TCP 3389), indicating a broad probing strategy designed to maximize infiltration odds.
Historical telemetry from April 2025 confirms that Telkom Internet LTD (AS210848) and IP Volume Inc. (AS202425) previously funneled similarly massive scanning operations through VAIZ and E-RISHENNYA prefixes.

During that period, honeypot networks recorded more than 27 000 attack attempts in a single week from AS210848 alone, and SANS Institute metrics logged tens of thousands of hits on port 5555 originating from these ASNs.
This persistent noise underscores the networks’ dual role as both brute-force platforms and staging grounds for malware command-and-control hosting and phishing infrastructure.
Analysis of WHOIS data traces the administrative oversight of FDN3 to Russian-registered maintainer Alex Host LLC (“ru-alexgroup-1-MNT”), a bulletproof hosting provider with a documented history of supporting illicit RaaS operators.
Prefix transfers between UA- and RU-registered entities—such as the movement of 45.143.201.0/24 from TOV VAIZ PARTNER to Verasel Inc.

(AS2100195) in Seychelles—suggest a strategic chain of shell companies engineered to frustrate attribution and takedown efforts.
Compounding the threat, Bulgarian front networks such as ROZA-AS (AS212283) and SS-Net (AS204428) have also cycled Ukrainian prefixes to ensure uninterrupted access to abused IP ranges.
In June and July 2025, SS-Net prefixes 83.222.190.0/24 and 83.222.191.0/24 recorded more than 55 000 and 12 900 RDP login attempts, respectively, further indicating the actors’ reliance on geographically diverse bulletproof hosting partners.
The operational resilience of these networks underscores the limitations of perimeter defenses against credential-stuffing and brute-force campaigns.
Experts recommend immediately implementing stringent rate-limiting, multi-factor authentication, and comprehensive blocklisting of known abusive ASNs.
Organizations should subscribe to reputable threat intelligence blocklists, such as those published by Spamhaus, to proactively deny traffic from high-risk networks.
As RaaS operations continue to refine initial access tactics, the security community must adapt by correlating BGP prefix movements with attack telemetry, enriching context for real-time defensive measures.
The July 2025 Ukrainian network campaigns stand as a stark reminder that adversaries increasingly leverage layered, multinational bulletproof hosting infrastructures to sustain intense brute-force operations—underscoring the pressing need for coordinated global efforts to dismantle these abusive networks.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.