Microsoft Dismantles RedVDS Phishing Platform Behind $40M Fraud
Coordinated takedown seizes cybercrime service that enabled 191,000 account compromises. Operation marks Microsoft's 35th action against criminal infrastructure.
Microsoft announced Tuesday that it disrupted RedVDS, a cybercrime-as-a-service platform that powered phishing campaigns responsible for at least $40 million in fraud losses since March 2025. The operation, coordinated with Europol and German authorities, seized domains and servers used by criminals to compromise nearly 200,000 Microsoft accounts.
The takedown marks Microsoft's 35th civil action against cybercrime infrastructure and its first combined legal action in both the United States and United Kingdom.
What Was RedVDS?
RedVDS launched in 2019 as a virtual dedicated server (VDS) service catering specifically to cybercriminals. For as little as $24 per month, customers could spin up disposable Windows-based RDP servers pre-configured for mass phishing, business email compromise, financial fraud, and account takeover.
The service handled the technical overhead that would otherwise slow down criminal operations: acquiring infrastructure, configuring systems, and maintaining anonymity. Customers got clean Windows Server 2022 machines ready for immediate use. When those servers got flagged or burned, they could simply provision new ones.
In a single month, criminals operating more than 2,600 RedVDS virtual machines sent an average of 1 million phishing messages per day targeting Microsoft customers alone. Since September 2025, this infrastructure enabled the compromise of over 191,000 Microsoft email accounts across 130,000 organizations worldwide.
The Technical Fingerprint
Microsoft's Digital Crimes Unit tracked RedVDS through a distinctive technical artifact. The service's developer created all virtual machines from a single cloned Windows Server 2022 image. Every instance shared the same computer name: WIN-BUNS25TD77J.
This operational shortcut—presumably intended to streamline provisioning—left a forensic trail that helped investigators connect disparate criminal campaigns back to a common source. Different phishing operations, different target industries, different geographic regions, but all running on machines with identical system identifiers.
Microsoft tracks the threat actor operating RedVDS as Storm-2470. Multiple other criminal groups used the infrastructure, including Storm-0259, Storm-2227, Storm-1575, and Storm-1747. Some had previously used the RacoonO365 phishing service before its takedown last year.
Industries and Victims
RedVDS-enabled campaigns targeted organizations across legal, construction, manufacturing, real estate, healthcare, and education sectors. Victims spanned the United States, Canada, United Kingdom, France, Germany, Australia, and countries with significant banking infrastructure.
Some high-profile losses documented by Microsoft:
- H2-Pharma (Alabama pharmaceutical company): $7.3 million
- Gatehouse Dock Condominium Association (Florida): Nearly $500,000 in resident repair funds
These represent business email compromise attacks where criminals intercept or impersonate legitimate communications to redirect payments. The losses hit organizations that can least afford them—healthcare providers, community associations, small businesses—while enabling criminal operations to scale.
The Takedown Operation
Microsoft's legal action resulted in seizure of two domains hosting the RedVDS marketplace and customer portal. German authorities and Europol coordinated server takedowns across multiple jurisdictions.
The civil actions in U.S. and U.K. courts provide legal mechanisms to identify individuals behind the service. While the immediate disruption stops current operations, the investigation continues toward attribution and potential criminal prosecution.
From Microsoft's announcement: "Through this coordinated action, Microsoft disrupted RedVDS's operations, including seizing two domains that host the RedVDS marketplace and customer portal, while also laying the groundwork to identify the individuals behind them."
Why This Matters
RedVDS exemplifies the industrialization of cybercrime. The service commoditized infrastructure that would otherwise require technical expertise to deploy. By handling the operational complexity, RedVDS lowered barriers for criminals who could focus purely on social engineering and fraud schemes.
The $24/month subscription cost made sophisticated phishing accessible to virtually anyone. Compare that to the $40 million in documented U.S. losses alone—the return on investment for criminals was astronomical.
Microsoft's sustained campaign against such infrastructure matters because it increases friction for criminal operations. When platforms like RedVDS go down, criminals must find alternatives, rebuild infrastructure, or develop new operational security. That displacement doesn't stop cybercrime, but it does slow it down and raise costs.
For organizations, the lesson reinforces familiar guidance: email filtering, multi-factor authentication, payment verification procedures, and employee training remain critical defenses against phishing and BEC attacks. The infrastructure behind these campaigns may change, but the attack patterns persist.
Related Articles
Microsoft: Tycoon2FA Phishing Exploits Email Misconfigurations
Threat actors spoof organization domains by abusing complex mail routing and weak DMARC policies. Microsoft blocked 13 million malicious emails in October alone.
Jan 7, 2026Russia's APT28 Harvests Credentials Across Balkans and Central Asia
Fancy Bear campaigns from February through September 2025 targeted energy, defense, and policy organizations using fake VPN and email login pages.
Jan 11, 2026Google Cloud Feature Weaponized in 9,000-Email Phishing Wave
Attackers abuse Google Cloud Application Integration to send phishing emails that bypass SPF, DKIM, and DMARC, targeting 3,200 organizations globally.
Jan 3, 2026Silver Fox APT Impersonates Indian Tax Officials in Espionage Campaign
CloudSEK identifies Chinese threat group Silver Fox targeting Indian organizations with phishing emails disguised as income tax department communications.
Dec 31, 2025