The Cybersecurity & Infrastructure Security Agency and its partners released a guide on mitigating risks from bulletproof hosting (BPH) providers.
Details: CISA said:
-
The guide will help internet service providers and network defenders mitigate cybercriminal activity enabled by BPH providers.
-
Organizations with unprotected or misconfigured systems remain at high risk of compromise, as malicious actors leverage BPH infrastructure for activities such as ransomware, phishing, malware delivery, and denial-of-service attacks.
-
By reducing the effectiveness of BPH infrastructure, defenders can force cybercriminals to rely on legitimate providers that comply with legal processes.