Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups.
The Spamdot admins went by the nicknames Icamis, and Salomon.
Icamis and Sal were in daily communications with these botmasters, via the Spamdot forum and private messages.
The identity and whereabouts of Icamis have remained a mystery to this author until recently.
For years, security experts - and indeed, many top cybercriminals in the Spamit affiliate program - have expressed the belief that Sal and Icamis were likely the same person using two different identities.
In 2010 Spamdot and its spam affiliate program Spamit were hacked, and its user database shows Sal and Icamis often accessed the forum from the same Internet address - usually from Cherepovets, an industrial town situated approximately 230 miles north of Moscow.
It was common for Icamis to reply when Spamdot members communicated a request or complaint to Sal, and vice versa.
Still, other clues suggested Icamis and Sal were two separate individuals.
That story mentioned Rescator's real-life identity was exposed by Icamis in April 2013, as part of a lengthy farewell letter Ika wrote to Spamdot members wherein Ika said he was closing the forum and quitting the cybercrime business entirely.
To no one's shock, Icamis didn't quit the business: He just got a lot more quiet and circumspect about his work, which increasingly was focused on helping crime groups siphon funds from U.S. bank accounts.
GENTLEMEN SCAMMERS. Icamis and Sal offered a comprehensive package of goods and services that any aspiring or accomplished spammer would need on a day-to-day basis: Virtually unlimited bulletproof domain registration and hosting services, as well as services that helped botmasters evade spam block lists generated by anti-spam groups like Spamhaus.org.
Long-term partnerships with several in several parts of the world for any topic- your own data center and full legal support- realtime backups to neutral sites- guarantees and full responsibility for the services provided- non-standard equipment on request- our own admins to resolve any technical issues- hosting is also possible.
Ssl certificates signed by geotrust and thawte- old domains- beautiful domains- domains with indicators- making unstable gtld domains stable- interception and hijacking of custom domains- full domain posting via web.
Icamis and Sal frequently claimed that their service kept Spamhaus and other anti-spam groups several steps behind their operations.
In 2020, Grichishkin was arrested outside of Russia on a warrant for providing bulletproof hosting services to cybercriminal gangs.
ICAMIS, THE PHANTOM GRADUATE. The identity of Icamis came into view when KrebsOnSecurity began focusing on clues that might connect Icamis to Cherepovets.
Icamis promoted his services in 2003 - such as bulk-domains[.
I can register bulletproof domains for sites and projects advertised by spam(of course they must be legal).
To bring this full circle, Icamis was Andrey Skvortsov, the other Russian man charged alongside Grichiskin.
The government says Ika and Sal's bulletproof hosting empire provided extensive support for a highly damaging cybercrime group known as the JabberZeus Crew, which worked closely with the author of the Zeus Trojan - Evgeniy Mikhailovich Bogachev - to develop a then-advanced strain of the Zeus malware that was designed to defeat one-time codes for authentication.


This Cyber News was published on krebsonsecurity.com. Publication date: Mon, 08 Jan 2024 18:05:29 +0000


Cyber News related to Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell - In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. The Spamdot admins went by the ...
1 year ago Krebsonsecurity.com
Cisco Duo and ISE: Better together in the cybersecurity battlefield - Luckily for you, Cisco Duo and ISE are the perfect pair to protect your network. Think of Cisco Duo's multi-factor authentication as the added layer of security that verifies a user's identity at the time of login, like a high-tech forcefield that ...
1 year ago Feedpress.me
Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work | The Record from Recorded Future News - Aeza Group is a bulletproof hosting (BPH) services provider, the department said, that allows cybercriminals to avoid law enforcement while renting IP addresses, servers and domains used for disseminating malware, supporting darknet markets and ...
3 weeks ago Therecord.media LockBit
Ten Years Later, New Clues in the Target Breach - On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. Ten years later, KrebsOnSecurity has ...
1 year ago Krebsonsecurity.com
Russian Hackers Using Russia-Based Bulletproof Network to Switch Network Infrastructure - Russian-aligned hacking groups UAC-0050 and UAC-0006 have been observed switching their network infrastructure through bulletproof hosting providers, enabling persistent campaigns against Ukrainian entities and their international allies. The complex ...
3 months ago Cybersecuritynews.com
Bulletproof Hosting Provider Aeza Group Shifting Their Infrastructure to New Autonomous System - Following U.S. Treasury sanctions imposed on July 1, 2025, the notorious bulletproof hosting provider Aeza Group has rapidly migrated its infrastructure to a new autonomous system in an apparent attempt to evade enforcement measures. The U.S. ...
1 day ago Cybersecuritynews.com
Aeza Group sanctioned for hosting ransomware, infostealer servers - The U.S. Department of the Treasury has sanctioned Russian hosting company Aeza Group and four operators for allegedly acting as a bulletproof hosting company for ransomware gangs, infostealer operations, darknet drug markets, and Russian ...
3 weeks ago Bleepingcomputer.com LockBit BianLian
Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster - Earlier this week, the authorities in the United States, Australia, and the United Kingdom, announced sanctions against the same bulletproof hosting provider for its involvement in cybercrime operations. The servers were located in the Paul van ...
5 months ago Bleepingcomputer.com LockBit
Cyberattack on Russian independent media had links to US-sanctioned institute, researchers find | The Record from Recorded Future News - In a report last week, U.S. cybersecurity firm Trustwave revealed that the threat actor known as Blind Eagle used the Russian bulletproof hosting service Proton66 to host various types of malicious content, including phishing pages. The hosting ...
3 weeks ago Therecord.media LockBit
Threat Actor Leaked Data from Major Bulletproof Hosting Medialand - A significant data breach occurred when an unidentified threat actor leaked internal data from Medialand, a major bulletproof hosting (BPH) provider with extensive ties to cybercriminal operations worldwide. ????️ On March 28, 2025, a threat actor ...
3 months ago Cybersecuritynews.com
U.S. Treasury Sanctioned Bulletproof Hosting Provider Used by Ransomware Operator Groups - The company’s bulletproof hosting infrastructure supported notorious ransomware groups, including BianLian operators and hosted command-and-control (C2) panels for the Meduza and Lumma infostealers, which specifically targeted the U.S. defense ...
3 weeks ago Cybersecuritynews.com BianLian
Feds Sanction Russian Hosting Provider Over LockBit Attacks - "It is important to acknowledge that although sanctions might impede ransomware operations by targeting their infrastructure, ransomware groups such as LockBit are highly adaptive and well-connected, and will likely have other providers ...
5 months ago Darkreading.com LockBit
The Persistent Danger of Remcos RAT - From initial infection to persistent control, the Remcos RAT campaign exemplifies the evolving nature of cyber threats and the need for proactive defense measures. This ecosystem is supported by a diverse array of servers that function as command and ...
1 year ago Cyberdefensemagazine.com
CVE-2020-26205 - Sal is a multi-tenanted reporting dashboard for Munki with the ability to display information from Facter. In Sal through version 4.1.6 there is an XSS vulnerability on the machine_list view. ...
4 years ago
Police arrest four suspects linked to LockBit ransomware gang - Previous arrests of Lockbit ransomware actors (some of them already charged for various offenses) include Mikhail Pavlovich Matveev (aka Wazawaka) in May 2023, Artur Sungatov and Ivan Gennadievich Kondratiev (aka Bassterlord) in February 2024, and ...
9 months ago Bleepingcomputer.com LockBit
CVE-2021-1492 - The Duo Authentication Proxy installer prior to 5.2.1 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an ...
4 years ago
CVE-2021-26253 - A potential vulnerability in Splunk Enterprise's implementation of DUO MFA allows for bypassing the MFA verification in Splunk Enterprise versions before 8.1.6. The potential vulnerability impacts Splunk Enterprise instances configured to use DUO ...
2 years ago
CVE-2023-48692 - Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components ...
1 year ago Tenable.com
CVE-2023-48691 - Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause an out-of-bounds write in Azure RTOS NETX Duo, that could lead to remote code execution. The affected ...
1 year ago Tenable.com
CVE-2023-48316 - Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components ...
1 year ago Tenable.com
CVE-2020-3483 - Duo has identified and fixed an issue with the Duo Network Gateway (DNG) product in which some customer-provided SSL certificates and private keys were not excluded from logging. This issue resulted in certificate and private key information being ...
4 years ago
CVE-2023-48315 - Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components ...
1 year ago Tenable.com
Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News - “The Cybercrime Team Amsterdam will, in consultation with the Public Prosecution Service, further investigate the data found on the seized servers,” Dutch police said. Police in the Netherlands say they seized 127 servers this week that were used ...
5 months ago Therecord.media
Hackers Leveraging Fast Flux Technique to Evade Detection - As cybercriminal operations grow increasingly sophisticated, threat actors adopt advanced techniques like fast flux to mask malicious infrastructure, evade defensive measures, and maintain persistent access to compromised networks. Security analysts ...
3 months ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)