{"id":43537,"date":"2021-10-21T15:19:27","date_gmt":"2021-10-21T15:19:27","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32744\/Duo-Sentenced-For-Roles-In-Running-Bulletproof-Hosting-Service.html"},"modified":"2021-10-21T15:19:27","modified_gmt":"2021-10-21T15:19:27","slug":"duo-sentenced-for-roles-in-running-bulletproof-hosting-service","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/","title":{"rendered":"Duo Sentenced For Roles In Running Bulletproof Hosting Service"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>A US judge has sentenced two Eastern European men for operating a bulletproof hosting service leveraged by cybercriminals to deploy malware.<\/p>\n<p>On Wednesday, the US Department of Justice (DoJ) said that Pavel Stassi and Aleksandr Skorodumov, of Estonia and Lithuania, <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-individuals-sentenced-providing-bulletproof-hosting-cybercriminals\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">have now been jailed<\/a> for 24 months and 48 months, respectively.&nbsp;<\/p>\n<p>The 30 and 33-year-old duo were accused of providing online hosting services that are known as bulletproof &#8212; a popular option for cybercriminals who need a host that will turn a blind eye to criminal activity.&nbsp; <\/p>\n<p>Bulletproof hosting providers, often found on the Dark Web, may host malware, explicit abuse material, or e-commerce platforms offering illegal wares such as criminal hacking tools, drugs, and weaponry.&nbsp; <\/p>\n<p>In this case, the bulletproof host was used to store malware payloads including Zeus, SpyEye, Citadel, and the Blackhole exploit kit.&nbsp; <\/p>\n<p>The DoJ says that between 2009 and 2015, Stassi and Skorodumov, <a href=\"https:\/\/www.zdnet.com\/article\/group-pleads-guilty-to-running-bulletproof-hosting-service-for-criminal-gangs-malware-payloads\/\" target=\"_blank\" rel=\"noopener\">together with co-defendants<\/a> Aleksandr Grichishkin and Andrei Skvortsov from Russia, rented servers and domains to threat actors.&nbsp; <\/p>\n<p>The infrastructure was used to host malware utilized in campaigns against financial institutions and other victims, leading to the theft and attempted theft of &#8220;millions of dollars&#8221; in the United States alone. In addition, the bulletproof host was also used in the creation of botnets.&nbsp; <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>Skorodumov acted as a lead system administrator who also provided technical support to customers. Stassi was involved in general admin tasks, marketing, and would use either stolen or false information to register web hosts and to open financial accounts for the scheme.&nbsp; <\/p>\n<p>Grichishkin and Skvortsov were founding members and day-to-day managers.&nbsp; <\/p>\n<p>&#8220;The defendants also helped their clients evade detection by law enforcement and continue their crimes uninterrupted by monitoring sites used to blocklist technical infrastructure used for crime, moving &#8220;flagged&#8221; content to new infrastructure, and registering all such infrastructure under false or stolen identities,&#8221; the DoJ says.&nbsp; <\/p>\n<p>All four suspects pleaded guilty to one count of Racketeer Influenced and Corrupt Organizations (<a href=\"https:\/\/www.justice.gov\/archives\/jm\/criminal-resource-manual-109-rico-charges\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">RICO<\/a>) conspiracy at the US District Court in the Eastern District of Michigan. Grichishkin and Skvortsov are awaiting their sentence, although they may face far higher penalties of up to 20 years behind bars each.&nbsp; <\/p>\n<p>&#8220;Over the course of many years, the defendants facilitated the transnational criminal activity of a vast network of cybercriminals throughout the world by providing them a safe haven to anonymize their criminal activity,&#8221; commented Special Agent in Charge Timothy Waters of the FBI&#8217;s Detroit Field Office. &#8220;Cybercriminals may believe they are beyond the reach of the FBI and our international partners, but today&#8217;s proceeding proves that anyone who facilitates or profits from criminal cyber activity will be brought to justice.&#8221; <\/p>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32744\/Duo-Sentenced-For-Roles-In-Running-Bulletproof-Hosting-Service.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5312],"class_list":["post-43537","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackermalware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T15:19:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Duo Sentenced For Roles In Running Bulletproof Hosting Service\",\"datePublished\":\"2021-10-21T15:19:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/\"},\"wordCount\":474,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\\\/2021\\\/05\\\/05\\\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\\\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"keywords\":[\"headline,hacker,malware\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/\",\"name\":\"Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\\\/2021\\\/05\\\/05\\\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\\\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-10-21T15:19:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\\\/2021\\\/05\\\/05\\\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\\\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\\\/2021\\\/05\\\/05\\\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\\\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Duo Sentenced For Roles In Running Bulletproof Hosting Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/","og_locale":"en_US","og_type":"article","og_title":"Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-21T15:19:27+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Duo Sentenced For Roles In Running Bulletproof Hosting Service","datePublished":"2021-10-21T15:19:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/"},"wordCount":474,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","keywords":["headline,hacker,malware"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/","url":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/","name":"Duo Sentenced For Roles In Running Bulletproof Hosting Service 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-10-21T15:19:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6d5cca8bba581e0d422015ed5712373ed9c1a7b9\/2021\/05\/05\/68186d8a-bb4e-4cd7-994f-c50dc4f773a8\/shutterstock-coders-melody-smart-small-copy.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/duo-sentenced-for-roles-in-running-bulletproof-hosting-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalware\/"},{"@type":"ListItem","position":3,"name":"Duo Sentenced For Roles In Running Bulletproof Hosting Service"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43537"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43537\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}