UK Sanctions ZSERVERS: A Major Move Against Russian Cybercrime Networks
Executive Summary
The UK sanctions on ZSERVERS, which is a Russian bulletproof hosting provider, as part of a coordinated effort with the US and Australia. This step directly targets cybercriminal infrastructure used by ransomware groups. These groups include but are not limited to LockBit and Evil Corp etc. All such groups have historically carried out large-scale cyberattacks against businesses and critical infrastructures. The sanctions also affect six individuals and a UK-based front company named XHOST Internet Solutions LP. This move aligns with a broader international strategy to disrupt ransomware operations, block illicit financial channels, and improve global cybersecurity.
Why Has the UK Sanctioned ZSERVERS?
ZSERVERS, which is known for providing untraceable hosting services, has been a crucial enabler for cybercriminals, allowing them to operate beyond law enforcement’s reach. The UK government has blacklisted ZSERVERS due to its direct links with ransomware groups. These groups include LockBit and Evil Corp etc., all such groups have executed devastating cyberattacks affecting organizations worldwide.
Cybercriminals have relied on ZSERVERS to store stolen data, host phishing websites, and launch ransomware operations. The UK’s sanctions aim to disrupt these networks and weaken the infrastructure supporting cybercrime. (Learn more about phishing attacks).
Who Are ‘LockBit’ and ‘Evil Corp’?

LockBit Ransomware Group
LockBit is considered one of the most active ransomware-as-a-service (RaaS) groups and has been in operation since 2019. It has been responsible for numerous attacks on corporate, government, and infrastructure targets.
Identifiable Features:
- Advanced encryption techniques which are making recovery of evidence more difficult for benefiting the victims.
- Double extortion tactics, which is a more lethal technique in which victims are pressurized for data leaks.
- Decentralized affiliates, which is even more devastating where perpetrators ensure widespread operations.
Major Attacks:
- Royal Mail Cyberattack (2023) – In this attack, they disrupted international mail services in the UK. (Source)
- Multiple financial sector breaches – The attack resulted in multimillion-dollar ransoms.
Evil Corp: A Financially Motivated Cybercrime Group
Evil Corp is a Russian cybercrime organization that has been involved in large-scale financial fraud and malware-based attacks.
Identifiable Features:
- Developers of Dridex, which is a banking malware and is used for large-scale financial theft.
- Creators of ransomware variants like BitPaymer, WastedLocker, and Hades.
- They are also experts in frequent re-branding to evade detection and sanctions.
Major Attacks:
- Dridex Malware Fraud – In this attack, they drained millions of dollars from banks and companies.
- Hades Ransomware Campaign – They disrupted operations of major companies across the world.
Who Has Been Sanctioned by UK?

The UK has sanctioned the following six individuals who are linked to ZSERVERS:
- Aleksandr Bolshakov
- Aleksandr Mishin
- Ilya Sidorov
- Dmitriy Bolshakov
- Igor Odintsov
- Vladimir Ananev
Additionally, XHOST Internet Solutions LP, which is a UK-based front company, has also been blacklisted.
How Will These Sanctions Impact Cybercrime?
The enforcement of these sanctions is expected to significantly weaken ZSERVERS by: ✅ Freezing financial assets which are linked to any type of cybercrime.
✅ Blocking hosting services which support ransomware operations in any way.
✅ Making it harder for cybercriminals to carry out large-scale attacks.
A Global Push to Fight Cybercrime

This action by the UK is part of a larger global effort to disrupt cybercriminal ecosystems. Authorities believe that targeting infrastructure supporting cybercrime is essential in fighting ransomware threats. (Read more about ransomware).
Moreover, the following statements have been made on behalf of the UK Government:
UK Foreign Secretary David Lammy:
“We are committed to dismantling Russia’s cybercrime networks and protecting businesses and individuals worldwide.”
Minister of State for Security Dan Jarvis:
“Restricting cybercriminal infrastructure is a key step in securing the digital landscape.”
What Businesses and Individuals Should Adopt?
With the UK sanctions on ZSERVERS, cybercriminals will have to search for alternative hosting services. However, to stay safe, businesses and individuals should adopt the following measures:
- Strengthened Security Measures – Businesses and individuals should adopt multi-factor authentication and advanced end-to-end protection. (Cybersecurity Best Practices).
- Regulate Data Backups – Organizations must keep a secure backup of their sensitive data to avoid downtime in case of an attack.
- Educate Employees About Cyber Threats – Awareness helps to prevent phishing attempts. Therefore, businesses should educate their employees about the latest threats. (Phishing Protection Guide).
- Monitor Financial Transactions for Irregularities – Early detection can stop fraud.
Final Thoughts
The UK’s decision to sanction ZSERVERS marks a significant step in combating cybercrime. While it disrupts criminal networks, cybercriminals will continue evolving their tactics. Businesses must remain vigilant, enhance their cybersecurity measures, and stay informed about emerging threats.
Your Opinion Matters
Do you think these sanctions will deter cybercriminal activities? Share your thoughts in the comments.
#CyberSecurity #UKSanctions #ZSERVERS #LockBit #EvilCorp #Ransomware #DigitalForensics #DataProtection