- Security News
- Cybercrime & Digital Threats
- Bulletproof Hosting Services: Cybercriminal Hideouts for Lease
View research paper: Criminal Hideouts for Lease: Bulletproof Hosting Services
There are many facets to a cybercriminal operation, and one of them that is often overlooked—but is no less significant—is the hosting servers from which they launch their attacks. Commonly known in the industry as Bulletproof Hosting Servers (BPHS), these are hardware-, software- or application-based hosting facilities that can store any type of content and executable code, just like any regular hosting service. What makes them different? These types of servers can be used to host malicious content, such as phishing sites, pornography, fake shopping and carding sites, and even command-and-control (C&C) infrastructure. In short, it’s the foundation by which major cybercriminal operations are built upon..
This latest research aims to bring these hosting services to the public eye, offering a look into the more obscure details of cybercrime. Specifically, it seeks to answer the following questions:
Through extensive research, we are able to provide the following answers:
More details and in-depth analysis are available in the full paper, Cybercriminal Hideouts for Lease: BulletProof Hosting Services.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.