Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses

Must Read

List of United Bank for Africa (UBA) Sort Codes & Branches (with addresses) in Nigeria

The sort code is a number that usually identifies both the bank and the branch where an account is held. The sort...

List of Access Bank Sort Codes & Branches (with addresses) in Nigeria

The sort code is a number which usually identifies both the bank and the branch where an account is...

How To Block Your Bank Account And SIM Card In Case Of Emergency

Losing your phone and wallet or having them stolen can be very frustrating. However, in case that happens to...
- Advertisement -

Threat correlation and visibility creates effective means to render cybercrime profitless

 

HONG
KONG, CHINA – Media OutReach – 13 October
2020 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today released key ways to identify and
disrupt criminal market operations to conclude a three-part report series on
the underground hosting market. In the report, researchers outline the
infrastructure business approaches of attackers to help security teams and law
enforcement agencies best recognize, defend against, and disrupt them.

 

Understanding criminal operations, motivations and
business models is key to dismantling the bulletproof hosting industry on which
the majority of global cybercrime is built.

- Advertisement -

 

“Increasingly, mature organizations have SOC and
XDR capabilities, which means security teams today have moved into the realm of
also being investigators,” said Robert McArdle, director of forward-looking
threat research at Trend Micro. “At that level of security sophistication, you
need to understand how the criminals operate to strategically defend against
attackers. We hope this report provides insight into cybercriminal operations
that can prove actionable for organizations and ultimately make hosters lose
profits.”

 

Bulletproof hosters (BPH) are the root of
cybercriminal infrastructure and therefore use a sophisticated business model
to outlast takedown efforts. These include flexibility, professionalism and
offering a range of services to cater to an array of customer needs.

- Advertisement -

 

The report details several effective methods to
help investigators identify underground hosters, including:

  • Identify which
    IP ranges are in public block deny lists, or those associated with a large
    number of public abuse requests, as those may be indicative of BPH.
  • Analyze autonomous system behavior and peering
    information patterns to flag activity that is likely associated to BPH.
  • Once one BPH host has been detected,
    use machine fingerprinting to detect others that may be linked to the same
    provider.
Read Also:  Nippon Paint Reveals the Winners of the Asia Young Designer Awards 2019/20

 

- Advertisement -

The report also lists methods for law enforcement
agencies and businesses to disrupt underground hosting businesses, without
necessarily needing to identify or takedown their servers. These include:

Read Also:  Infor Customer Excellence Award for Deployment of Infor HMS in the Cloud Awarded to Mandarin Oriental Hotel Group

 

  • Submit properly documented abuse
    requests to the suspected underground hosting provider and upstream peers.
  • Add BPH network ranges to
    well-established deny lists.
  • Increase the operational costs of the
    BPH, to impair business stability.
  • Undermine the
    reputation of the BPH on the cybercrime underground: perhaps via covert accounts that call into
    question the security of the criminal hosting provider or discuss possible
    collaboration with authorities.

 

To read the full report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/cybercrime-and-digital-threats/inside-the-bulletproof-hosting-business-cybercrime-methods-opsec.

 

About Trend Micro

Trend Micro, a
global leader in cybersecurity, helps make the world safe for exchanging
digital information. Leveraging over 30 years of security expertise, global
threat research, and continuous innovation, Trend Micro enables resilience for
businesses, governments, and consumers with connected solutions across cloud
workloads, endpoints, email, IIoT, and networks. Our XGen™ security strategy
powers our solutions with a cross-generational blend of threat-defense
techniques that are optimized for key environments and leverage shared threat
intelligence for better, faster protection. With over 6,700 employees in 65
countries, and the world’s most advanced global threat research and
intelligence, Trend Micro enables organizations to secure their connected world www.trendmicro.com.hk.

Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses

- Advertisement -
Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand SpurTrend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand Spur

Subscribe to BrandSpur Ng

Subscribe for latest updates. Signup to best of brands and business news, informed analysis and opinions among others that can propel you, your business or brand to greater heights.

- Advertisement -
Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand SpurTrend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand Spur

Latest News

Xiaomi Beats Estimates with Record Quarterly Revenue and Net Profit in Q3

Xiaomi Corporation, an internet company with a smartphone and smart hardware connected by an Internet of Things (“IoT”) platform...

Mutual Benefits Assurance Changes the Venue for Extra-Ordinary General Meeting

Mutual Benefits Assurance Plc wishes to notify its valued shareholders and stakeholders that the venue of the Company’s Extra-Ordinary General Meeting (EGM) scheduled to...

PZ Cussons Nigeria postpones its 72nd AGM

The Board of Directors of PZ Cussons Nigeria Plc, hereby announces the postponement of its 72nd Annual General Meeting earlier scheduled to hold on...

40,000 young people in Nigeria to benefit from Young Africa Works-IITA project training program

In May this year, the International Institute of Tropical Agriculture (IITA) partnered with the Mastercard Foundation to start the Young Africa Works-IITA Project, an...

10 characteristics of the average Nigerian

10 characteristics of the average Nigerian They are passionate about their religious faiths. An overwhelming number of Nigerians want to go to heaven when...
- Advertisement -
BrandsPur Weekly Cartoons
- Advertisement -Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand SpurTrend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses - Brand Spur