Microsoft Disrupts RedVDS Cybercrime Platform
The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.

The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.
January 14, 2026 | 3 min read

Microsoft has executed a disruption of RedVDS, a large-scale, subscription-based service allegedly used by a broad range of threat actors, seizing the marketplace’s infrastructure as part of a coordinated operation with law enforcement in the United States and abroad. The action, which included legal proceedings in both the U.S. and the United Kingdom, resulted in the complete shutdown of the RedVDS online marketplace.
The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud, including increasingly sophisticated, AI-enabled schemes like real estate payment diversion scams. Microsoft said it cooperated with authorities including Europol and law enforcement agencies in Germany.
“Microsoft tracks the threat actor who develops and operates RedVDS as Storm-2470. We have observed multiple cybercriminal actors, including Storm-0259, Storm-2227, Storm-1575, Storm-1747, and phishing actors who used the RacoonO365 phishing service prior its coordinated takedown, leveraging RedVDS infrastructure. RedVDS launched their website in 2019 and has been operating publicly since to offer servers in locations including the United States, United Kingdom, Canada, France, Netherlands, and Germany. The primary website used the redvds[.]com domain, with secondary domains at redvds[.]pro and vdspanel[.]space,” Microsoft Threat Intelligence researchers wrote in a report on the service.
“RedVDS uses a fictitious entity claiming to operate and be governed by Bahamian Law. RedVDS customers purchased the service through cryptocurrency, primarily Bitcoin and Litecoin, adding another layer of obfuscation to illicit activity.”
The Mechanism of the Threat: Cybercrime-on-Demand
Like many other cybercrime marketplaces, RedVDS operated as an online subscription service, allegedly providing criminals with cheap, effective, and disposable virtual environments. By offering access to these virtual machines—often running unlicensed Windows software—the platform made cybercrime scalable, cheap, and difficult to trace.
RedVDS launched their website in 2019 and has been operating publicly since to offer servers in locations including the United States, United Kingdom, Canada, France, Netherlands, and Germany.
Attackers leveraged RedVDS infrastructure for a wide array of activities:
The Role of AI in Scaling Fraud
A key hallmark of RedVDS-enabled attacks was the use of generative AI. Attackers frequently paired the service with AI tools to:
Financial and Human Toll
Since March 2025, RedVDS-enabled activity has driven approximately $40 million in reported fraud losses in the U.S. However, due to the global nature of the attacks and the high frequency of unreported incidents, Microsoft assesses the true economic and human toll to be far higher.
Two organizations joined Microsoft as co-plaintiffs in the civil action, illustrating the severe impact: H2-Pharma, an Alabama pharmaceutical company that lost more than $7.3 million, and Gatehouse Dock Condominium Association, a Florida-based association defrauded out of nearly $500,000 of residents’ funds.
Despite Microsoft blocking more than 600 million cyberattacks per day, the sheer volume facilitated by RedVDS led to widespread compromises. Since September 2025, RedVDS-enabled attacks have been linked to the fraudulent access or compromise of more than 191,000 organizations worldwide across industries including health care, manufacturing, logistics, and legal services.
The dismantling of RedVDS is expected to significantly degrade the operational capacity of cybercriminal groups who relied on the platform's infrastructure.
January 14, 2026 | 3 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.