CyberWire Daily

Bulletproof hosting (BPH) and how it powers cybercrime. [Research Saturday]

04.24.2021 - By N2K NetworksPlay

Download our free app to listen on your phone

Download on the App StoreGet it on Google Play

Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. 

The blog posts can be found here:

Hiding in plain sight: Bulletproof Hosting’s dueling forms

Bulletproof hosting: How cybercrime stays resilient

Here’s who is powering the bulletproof hosting market

More episodes from CyberWire Daily