Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

Ransomware operators are increasingly leveraging legitimate virtualization services to host and deliver malicious payloads at scale, blending their infrastructure into benign cloud systems to stay under the radar.

Researchers at Sophos uncovered that attackers are abusing ISPsystem’s VMmanager platform—a virtualization management solution used by many hosting providers—to spin up virtual machines (VMs) that mask malicious operations among ordinary cloud workloads.

What’s Happening

Sophos found that ISPsystem’s VMmanager tool uses default Windows VM templates that repeatedly generate the same hostnames and system identifiers. Attackers take advantage of this predictable behavior to deploy malicious VMs in bulk, which:

  • Appear similar to legitimate infrastructure,

  • Evade detection by blending in with thousands of normal VMs,

  • Make takedown and attribution more difficult for defenders.

Threat actors use these VMs for key parts of their campaigns like command-and-control (C2) and payload delivery, effectively hiding ransomware tooling among a sea of innocuous virtual servers.

Affected Actors & Infrastructure

Sophos’ analysis indicates that multiple ransomware groups and malware operations have utilized ISPsystem-provisioned VMs, including (but not limited to):

Group / Campaign

Role in Abuse

Notes

LockBit

Payload delivery & C2 infrastructure

One of the most prolific ransomware operations.

Qilin

Payload hosting

Known for cross-platform evasion tooling.

Conti

Infrastructure abuse

Major ransomware family with global impact.

BlackCat / ALPHV

Malware hosting & delivery

Widely used ransomware-as-a-service (RaaS).

Ursnif

Info-stealer & malware campaigns

Often tied to ransomware follow-on activity.

In many instances, the same VM hostnames (e.g., WIN-LIVFRVQFMKO and similar) appeared repeatedly across malicious infrastructure, which helped researchers link seemingly separate operations.

Why This Matters

This tactic matters because it blurs the line between legitimate and malicious cloud usage:

  • Stealth & blending: Attackers take advantage of trusted virtualization platforms to mask their servers among legitimate infrastructure.

  • Delayed detection: Using predictable, reused hostnames complicates rapid attribution and takedown efforts.

  • Global impact: Multiple major ransomware families can co-opt the same virtualization ecosystem.

Additionally, many of the hosting providers facilitating these VM deployments have questionable reputations or are resistant to abuse takedown requests.

How ISPsystem Responded

After being contacted by BleepingComputer, ISPsystem acknowledged the abuse and rolled out an update to its VMmanager templates. The update introduces randomized hostname generation, which aims to reduce the risk of attackers reusing predictable identifiers for malicious deployments.

According to the statement, this change should help diminish one of the key techniques that enabled widespread misuse of their platform.

What Organizations Should Do

To protect against this evolving abuse tactic, security teams should:

  • Enhance telemetry: Monitor for anomalous connections to cloud VM infrastructure—even if it appears legitimate.

  • Behavior over reputation: Focus on behavioral and traffic anomalies instead of simply trusting infrastructure because it belongs to a known provider.

  • Incident response readiness: Be prepared to pivot quickly when malicious VM usage is discovered within your environment.

Detecting and responding to ransomware operations that hide within legitimate cloud services is increasingly necessary as attackers adopt more sophisticated delivery methods.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Linux Dirty Frag Zero-Day Exploit Grants Root Privileges on Major Distros

Linux Dirty Frag Zero-Day Exploit Grants Root Privileges on Major Distros

Linux Dirty Frag Zero-Day Exploit Grants Root Privileges on Major Distros

Linux Dirty Frag Zero-Day Exploit Grants Root Privileges on Major Distros

Linux Dirty Frag Zero-Day Exploit Grants Root Privileges on Major Distros

May 8, 2026

Former Government Contractor Convicted for Wiping 96 Federal Databases

Former Government Contractor Convicted for Wiping 96 Federal Databases

Former Government Contractor Convicted for Wiping 96 Federal Databases

Former Government Contractor Convicted for Wiping 96 Federal Databases

May 8, 2026

The SharePoint Integrity Crisis: Zero-Day Spoofing and the Race to Patch

The SharePoint Integrity Crisis: Zero-Day Spoofing and the Race to Patch

The SharePoint Integrity Crisis: Zero-Day Spoofing and the Race to Patch

The SharePoint Integrity Crisis: Zero-Day Spoofing and the Race to Patch

The SharePoint Integrity Crisis: Zero-Day Spoofing and the Race to Patch

Apr 30, 2026

France Government Data Breach Exposes Millions of Citizen ID Records

France Government Data Breach Exposes Millions of Citizen ID Records

France Government Data Breach Exposes Millions of Citizen ID Records

France Government Data Breach Exposes Millions of Citizen ID Records

France Government Data Breach Exposes Millions of Citizen ID Records

Apr 23, 2026

Booking.com Data Breach Exposes Customer Reservation Data, Raises Phishing Risks

Booking.com Data Breach Exposes Customer Reservation Data, Raises Phishing Risks

Booking.com Data Breach Exposes Customer Reservation Data, Raises Phishing Risks

Booking.com Data Breach Exposes Customer Reservation Data, Raises Phishing Risks

Booking.com Data Breach Exposes Customer Reservation Data, Raises Phishing Risks

Apr 23, 2026

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Apr 22, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.