Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

Ransomware operators are increasingly leveraging legitimate virtualization services to host and deliver malicious payloads at scale, blending their infrastructure into benign cloud systems to stay under the radar.

Researchers at Sophos uncovered that attackers are abusing ISPsystem’s VMmanager platform—a virtualization management solution used by many hosting providers—to spin up virtual machines (VMs) that mask malicious operations among ordinary cloud workloads.

What’s Happening

Sophos found that ISPsystem’s VMmanager tool uses default Windows VM templates that repeatedly generate the same hostnames and system identifiers. Attackers take advantage of this predictable behavior to deploy malicious VMs in bulk, which:

  • Appear similar to legitimate infrastructure,

  • Evade detection by blending in with thousands of normal VMs,

  • Make takedown and attribution more difficult for defenders.

Threat actors use these VMs for key parts of their campaigns like command-and-control (C2) and payload delivery, effectively hiding ransomware tooling among a sea of innocuous virtual servers.

Affected Actors & Infrastructure

Sophos’ analysis indicates that multiple ransomware groups and malware operations have utilized ISPsystem-provisioned VMs, including (but not limited to):

Group / Campaign

Role in Abuse

Notes

LockBit

Payload delivery & C2 infrastructure

One of the most prolific ransomware operations.

Qilin

Payload hosting

Known for cross-platform evasion tooling.

Conti

Infrastructure abuse

Major ransomware family with global impact.

BlackCat / ALPHV

Malware hosting & delivery

Widely used ransomware-as-a-service (RaaS).

Ursnif

Info-stealer & malware campaigns

Often tied to ransomware follow-on activity.

In many instances, the same VM hostnames (e.g., WIN-LIVFRVQFMKO and similar) appeared repeatedly across malicious infrastructure, which helped researchers link seemingly separate operations.

Why This Matters

This tactic matters because it blurs the line between legitimate and malicious cloud usage:

  • Stealth & blending: Attackers take advantage of trusted virtualization platforms to mask their servers among legitimate infrastructure.

  • Delayed detection: Using predictable, reused hostnames complicates rapid attribution and takedown efforts.

  • Global impact: Multiple major ransomware families can co-opt the same virtualization ecosystem.

Additionally, many of the hosting providers facilitating these VM deployments have questionable reputations or are resistant to abuse takedown requests.

How ISPsystem Responded

After being contacted by BleepingComputer, ISPsystem acknowledged the abuse and rolled out an update to its VMmanager templates. The update introduces randomized hostname generation, which aims to reduce the risk of attackers reusing predictable identifiers for malicious deployments.

According to the statement, this change should help diminish one of the key techniques that enabled widespread misuse of their platform.

What Organizations Should Do

To protect against this evolving abuse tactic, security teams should:

  • Enhance telemetry: Monitor for anomalous connections to cloud VM infrastructure—even if it appears legitimate.

  • Behavior over reputation: Focus on behavioral and traffic anomalies instead of simply trusting infrastructure because it belongs to a known provider.

  • Incident response readiness: Be prepared to pivot quickly when malicious VM usage is discovered within your environment.

Detecting and responding to ransomware operations that hide within legitimate cloud services is increasingly necessary as attackers adopt more sophisticated delivery methods.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security
EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security
EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security
EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security

EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security

EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security

EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security

EDR Killer Tool Abuses Signed Kernel Driver to Disable Endpoint Security

Feb 6, 2026

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks
Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Russian Hackers Exploit Recently Patched Microsoft Office Vulnerability in Targeted Attacks

Feb 4, 2026

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls
Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Microsoft Teams Adds New Feature to Report Suspicious and Scam Calls

Jan 30, 2026

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs

Jan 29, 2026

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)
Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Microsoft Patches Actively Exploited Office Zero-Day Vulnerability (CVE-2026-21509)

Jan 27, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.