MLXIO
a rack of electronic equipment in a dark room
CybersecurityMay 22, 2026· 7 min read· By MLXIO Insights Team

Police Hacked First VPN—and Ransomware Crews Got Exposed

Share

MLXIO Intelligence

Analysis Snapshot

71
High
Confidence: MediumTrend: 10Freshness: 96Source Trust: 90Factual Grounding: 90Signal Cluster: 20

High MLXIO Impact based on trend velocity, freshness, source trust, and factual grounding.

Thesis

High Confidence

European law enforcement’s First VPN takedown shows investigators turned a cybercrime-focused anonymity service into an intelligence source by accessing user data, identifying users, seizing infrastructure, and arresting its administrator.

Evidence

  • Europol said First VPN was promoted on Russian-speaking cybercrime forums as a trusted tool for staying beyond law enforcement reach.
  • Investigators gained access to the service, obtained its user database, and identified VPN connections tied to cybercrime.
  • Authorities dismantled 33 servers and seized domains including 1vpns.com, 1vpns.net, 1vpns.org, and associated onion domains.
  • Europol reported 83 intelligence packages, information shared on 506 users, and 21 investigations advanced so far.

Uncertainty

  • Authorities have not disclosed the technical method used to access First VPN.
  • The public reporting does not specify exactly what data investigators saw for each user.
  • It remains unclear how many identified users will face charges or further enforcement.

What To Watch

  • Follow-on arrests or charges tied to the 506 users identified.
  • Additional disclosures on the technical access path or backend data obtained.
  • Further infrastructure takedowns targeting cybercrime-focused VPNs or anonymization services.

Verified Claims

European law enforcement dismantled First VPN, a VPN service allegedly used to conceal ransomware attacks, data theft, and other serious crimes.
📎 Europol said First VPN was used by cybercriminals to conceal ransomware attacks, data theft, and other serious offenses and was dismantled in an international operation.High
Investigators gained access to First VPN, obtained its user database, and identified VPN connections tied to cybercrime.
📎 The article states investigators “gained access to the service,” obtained its user database, and identified VPN connections used by cybercriminals.High
First VPN was promoted on Russian-speaking cybercrime forums as a tool for staying beyond law enforcement reach.
📎 Europol said First VPN was promoted on Russian-speaking cybercrime forums as a trusted tool for remaining beyond the reach of law enforcement.High
The operation dismantled 33 servers and led to the seizure of First VPN domains including 1vpns.com, 1vpns.net, and 1vpns.org.
📎 The article says authorities dismantled 33 servers and seized domains including 1vpns.com, 1vpns.net, 1vpns.org, plus associated onion domains.High
Europol reported that the First VPN operation produced 83 intelligence packages, shared information on 506 users internationally, and advanced 21 investigations.
📎 The article lists 83 intelligence packages, 506 users shared internationally, and 21 Europol-supported investigations advanced so far.High

Frequently Asked

What was First VPN accused of being used for?

First VPN was described by Europol as a VPN service used by cybercriminals to conceal ransomware attacks, data theft, and other serious offenses.

Did police identify users of First VPN?

Yes. Investigators said they obtained First VPN’s user database and identified VPN connections used by cybercriminals; Europol reported information on 506 users was shared internationally.

Who led the First VPN takedown operation?

Europol said the international operation was led by France and the Netherlands, with support from Europol and Eurojust.

What infrastructure was seized in the First VPN operation?

Authorities dismantled 33 servers and seized domains including 1vpns.com, 1vpns.net, 1vpns.org, along with associated onion domains.

What did First VPN claim about privacy before the takedown?

The service reportedly marketed hidden IP addresses, encrypted communications, and no logs, including a claim that its servers did not keep logs.

Updated on May 22, 2026

European police say they turned First VPN from a shield for cybercriminals into an intelligence source, identifying users before seizing its domains and arresting its administrator.

The takedown matters most to ransomware crews, fraud operators, and the brokers that sell them “safe” infrastructure. This was not just a website seizure. Investigators “gained access to the service,” obtained its user database, and identified VPN connections tied to cybercrime, according to Ars Technica.

The core of the case is blunt: users who bought anonymity allegedly became identifiable.

Criminal users face the real hit: the privacy product became the weak point

Authorities did not frame First VPN as an ordinary mainstream privacy service that merely happened to attract bad users. Europol said the service was promoted on Russian-speaking cybercrime forums as a trusted way to stay outside law enforcement’s reach.

Its own archived marketing leaned into the same pitch: hidden IP addresses, encrypted communications, and no logs.

The website reportedly claimed:

“All of our servers, meet high security requirements and do not keep logs, are set up by specialists with vast experience in this field. Big Brother is watching you, we are not!”

That claim now looks like the operational trap. Europol said investigators obtained the user database and identified VPN connections used by cybercriminals. The available public reporting describes First VPN as a service favored by cybercrime actors, including ransomware-linked users, rather than a safe haven beyond investigative reach.

The question for users: what exactly did police see?

Authorities have not disclosed the technical path. They have said enough to show the risk: if investigators gain access to the provider, the user’s threat model changes instantly.

A VPN can hide traffic from an ISP. It cannot guarantee safety if the provider’s infrastructure, backend systems, operator, user records, or connection data become visible to investigators. That distinction is where many criminal users appear to have mispriced the risk.

For context, MLXIO has covered how enforcement pressure increasingly targets the operational layer around attacks, not just the malware itself, as in Kimwolf Botmaster ‘Dort’ Arrested After Record IoT Attacks.


Investigators targeted infrastructure, not just suspects

The confirmed sequence is unusually revealing. The investigation began in December 2021, and Eurojust supported the cross-border case alongside Europol and national authorities.

The direct actions happened on May 19 and May 20. Authorities interviewed the administrator, conducted a house search in Ukraine, dismantled 33 servers, and seized domains including 1vpns.com, 1vpns.net, 1vpns.org, plus associated onion domains.

Computer Weekly identified the case as Operation Saffron, a Franco-Dutch-led operation supported by Europol, Eurojust, the UK’s National Crime Agency, and private-sector partner Bitdefender.

The numbers that show the scale

Confirmed figure Source-backed detail
33 servers dismantled Europol figure from the takedown
83 intelligence packages Europol figure from the operation
506 users Information shared internationally, according to Europol
21 investigations Europol-supported investigations advanced so far

Which number matters most? Not the domains. Domains are replaceable. The more consequential figures are the 506 users identified, the 83 intelligence packages, and the leads now available to investigators pursuing serious cybercrime cases.

The unresolved issue is the depth of access. Authorities said they obtained the user database and identified VPN connections used by cybercriminals. They have not publicly detailed how long that access lasted, what traffic or metadata was visible, or what data existed before police got inside the system.

VPN builders get a warning: “no logs” is only as strong as the operator and infrastructure

For VPN operators, First VPN is a reputational case study in reverse. The service advertised “no logs” and non-cooperation with judicial authorities. Eurojust said the website promised users it would not cooperate with any judicial authority, would not store data, and would not be subject to any jurisdiction.

Authorities say that posture did not protect users. It may have made the service more attractive to the exact audience police wanted to map.

Where the technical risk likely sits

MLXIO analysis: based on the official descriptions, this case appears less about breaking VPN encryption in the abstract and more about compromising or accessing the service layer around it.

That layer can include:

  • User databases: account records, identifiers, access credentials, or subscription data.
  • Connection records: timing, source and exit-node relationships, or session metadata if available.
  • Server infrastructure: systems that may be used to route or conceal cybercrime activity.
  • Administrative systems: panels or backend tools that reveal how the service is run.
  • Domains and onion services: control points that can be seized or redirected after judicial orders.

The sources do not say which of these paths gave investigators access. But they do show that the provider became the investigative chokepoint.

That is the sharper lesson for infrastructure builders. A privacy claim is not just a slogan. It is an operational burden. If the service attracts criminal dependency and centralizes trust in one operator, that operator becomes the target.


Victims and enterprises get better leads, but not instant closure

For organizations hit by ransomware or intrusion attempts, the takedown could matter because access infrastructure is often what connects otherwise separate incidents. If investigators can tie users, timestamps, domains, and servers together, they can turn a privacy service into a map of activity.

That gives defenders something concrete: infrastructure links can connect separate incidents that otherwise look unrelated.

But this does not mean every First VPN user was a confirmed ransomware operator. Europol said users of the criminal service were notified of the shutdown and informed that they had been identified. The next phase depends on how investigators connect specific users, timestamps, infrastructure, and alleged activity.

The useful takeaway for enterprises is narrower and more practical: access infrastructure is often part of the attack chain. Corporate defenders should treat suspicious VPN activity as one signal among others, not as proof by itself.

Law enforcement’s market signal: go after the services criminals trust

Europol framed the operation as a strike against a tool “designed specifically for criminal use.” Edvardas Šileris, head of Europol’s European Cybercrime Centre, told Computer Weekly:

“For years, cyber criminals saw this VPN service as a gateway to anonymity. They believed it would keep them beyond the reach of law enforcement. This operation proves them wrong.”

That is the strategic message. Police do not need to weaken every VPN protocol or crack every encrypted session if they can compromise the commercial infrastructure criminals rely on.

The likely target set is not ordinary VPN use. The source material points to niche services advertised in criminal forums, promising hidden infrastructure, anonymous payments, refusal to cooperate with courts, and immunity from jurisdiction. Those claims are now a liability for both sides: they attract criminal users, and they mark the service as high-value infrastructure for police.

The evidence that would strengthen this thesis is follow-on action: more arrests, more named ransomware cases, or additional infrastructure seizures tied to the 83 intelligence packages already generated. The evidence that would weaken it is thinner prosecutorial output after a loud takedown.

For now, First VPN shows that misplaced trust can be more fragile than encryption. The next cybercrime fight may turn less on cracking code and more on finding the business operators criminals believed would never betray them.

Impact Analysis

  • The operation shows that criminal-focused VPN services can become intelligence sources if law enforcement gains provider-level access.
  • Users who relied on First VPN’s no-logs and anonymity claims may now face identification through seized databases and connection records.
  • The takedown raises broader trust questions for privacy tools marketed as safe infrastructure for high-risk or illicit activity.
MLXIO

Written by

MLXIO Insights Team

Algorithmic Research & Human Oversight

Powered by advanced algorithmic research and perfected by human oversight. The Insights Team delivers highly structured, cross-verified analysis on emerging tech trends and digital shifts, filtering out the fluff to give you high-fidelity value.

Related Articles

text
CybersecurityMay 13, 2026

Foxconn Ransomware Attack Steals 8TB, Shakes Apple Supply Chain

Foxconn confirms ransomware attack stole 8TB of data from North American factories, threatening Apple’s supply chain and global tech manufacturing.

4 min read

A security and privacy dashboard with its status.
CybersecurityMay 19, 2026

Ransomware and Spyware Threats Crush Small Businesses in 2026

Ransomware and spyware threaten small businesses in 2026. Choosing the right antivirus software is critical to protect data and avoid costly disruptions.

11 min read

A cell phone sitting on top of a wooden table
CybersecurityMay 20, 2026

Free Steam Game Crashes but Secretly Steals Your Credentials

A free Steam game crashed on launch but secretly ran malware stealing user credentials, exposing risks even on trusted platforms.

3 min read

white router on black table
CybersecurityMay 12, 2026

FBI Issues Critical Router Reset and Replacement Warning

FBI and NSA remotely reset thousands of routers to block Russian cyberattacks, urging immediate replacement to prevent ongoing risks.

3 min read

a dell laptop computer with a red screen
CybersecurityMay 19, 2026

Top Antivirus Software for Windows 11 in 2026 Reveals Hidden Risks

Windows 11 users in 2026 confront stealthy cyber threats. This guide reveals which antivirus software outperforms built-in defenses to keep your PC safe.

12 min read

black and silver-colored Casio digital watch with link bracelet
TechnologyMay 22, 2026

£45 Casio W-738H Grabs Europe With 10-Year Battery

Casio’s £45 W-738H hits the UK with vibration alerts, 100m water resistance and a 10-year battery—but Europe is still incomplete.

5 min read

people walking on sidewalk near white concrete building during night time
CybersecurityMay 22, 2026

Leaked AWS GovCloud Keys Drag CISA Into Congress Fight

CISA faces congressional scrutiny after a contractor exposed agency credentials and AWS GovCloud keys on GitHub.

7 min read

a close up of a cell phone near a laptop
TechnologyMay 22, 2026

PureOS 11 Crimson Bets on Boring to Keep Privacy Fans

PureOS 11 Crimson ships no big features—but its stability push is the real pitch for privacy-focused Librem users.

7 min read

a pair of headphones and ear buds on a black surface
TechnologyMay 22, 2026

$248 Sony Deal Reveals Smart Memorial Day Tech Deals

The best Memorial Day tech deals favor daily-use upgrades, led by Sony WH-1000XM5 headphones at $248.

8 min read

black and silver asus laptop computer
TechnologyMay 22, 2026

QuarkOS 26.04 Bets on APT Over Snaps, KDE Plasma 6.6

QuarkOS 26.04 pairs Ubuntu LTS support with KDE Plasma 6.6 and an APT-first pitch for users wary of snaps.

7 min read

Stay ahead of the curve

Get a weekly digest of the most important tech, AI, and finance news — curated by AI, reviewed by humans.

No spam. Unsubscribe anytime.