STOCK TITAN

Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Negative)
Tags
Rhea-AI Summary

On October 6, 2020, Trend Micro published a report detailing methods to counter the underground hosting market used by cybercriminals. This report highlights the business strategies employed by bulletproof hosters that support cybercrime and offers actionable insights for security teams and law enforcement to disrupt these operations. Key methods include analyzing IP ranges and autonomous system behaviors to identify underground hosters, and strategies such as submitting abuse requests and impairing their business models to increase operational costs.

Positive
  • Provides effective methods for identifying and disrupting underground hosting operations, which are critical for cybersecurity.
  • Offers actionable insights for security teams, enhancing their investigative capabilities.
Negative
  • Inherent challenges in disrupting sophisticated, business-minded criminal operations.
  • Potentially limited immediate impact on long-standing BPH networks due to their resilience.

DALLAS, Oct. 6, 2020 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today released key ways to identify and disrupt criminal market operations to conclude a three-part report series on the underground hosting market. In the report, researchers outline the infrastructure business approaches of attackers to help security teams and law enforcement agencies best recognize, defend against, and disrupt them.

Understanding criminal operations, motivations and business models is key to dismantling the bulletproof hosting industry on which the majority of global cybercrime is built.

"Increasingly, mature organizations have SOC and XDR capabilities, which means security teams today have moved into the realm of also being investigators," said Robert McArdle, director of forward-looking threat research at Trend Micro. "At that level of security sophistication, you need to understand how the criminals operate to strategically defend against attackers. We hope this report provides insight into cybercriminal operations that can prove actionable for organizations and ultimately make hosters lose profits."

Bulletproof hosters (BPH) are the root of cybercriminal infrastructure and therefore use a sophisticated business model to outlast takedown efforts. These include flexibility, professionalism and offering a range of services to cater to an array of customer needs.

The report details several effective methods to help investigators identify underground hosters, including:

  • Identify which IP ranges are in public block deny lists, or those associated with a large number of public abuse requests, as those may be indicative of BPH.
  • Analyze autonomous system behavior and peering information patterns to flag activity that is likely associated to BPH.
  • Once one BPH host has been detected, use machine fingerprinting to detect others that may be linked to the same provider.

The report also lists methods for law enforcement agencies and businesses to disrupt underground hosting businesses, without necessarily needing to identify or takedown their servers. These include:

  • Submit properly documented abuse requests to the suspected underground hosting provider and upstream peers.
  • Add BPH network ranges to well-established deny lists.
  • Increase the operational costs of the BPH, to impair business stability.
  • Undermine the reputation of the BPH on the cybercrime underground: perhaps via covert accounts that call into question the security of the criminal hosting provider or discuss possible collaboration with authorities.

To read the full report, please visit: https://www.trendmicro.com/vinfo/us/cybercrime-and-digital-threats/inside-the-bulletproof-hosting-business-cybercrime-methods-opsec.

About Trend Micro
Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers with connected solutions across cloud workloads, endpoints, email, IIoT, and networks. Our XGen™ security strategy powers our solutions with a cross-generational blend of threat-defense techniques that are optimized for key environments and leverage shared threat intelligence for better, faster protection. With over 6,700 employees in 65 countries, and the world's most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world. www.trendmicro.com

Cision View original content:http://www.prnewswire.com/news-releases/trend-micro-research-reveals-top-tactics-to-disrupt-underground-hosting-businesses-301145985.html

SOURCE Trend Micro Incorporated

FAQ

What does Trend Micro's report on October 6, 2020 focus on?

The report details methods to identify and disrupt the underground hosting market supporting cybercrime.

What are the main tactics suggested by Trend Micro to disrupt bulletproof hosters?

The tactics include submitting abuse requests, analyzing IP behaviors, and increasing operational costs for BPH.

How does the report help security teams and law enforcement?

It provides insights into cybercriminal operations to enhance investigative strategies and improve defense mechanisms.

Why are bulletproof hosters significant in cybercrime?

They form the backbone of cybercriminal infrastructure, using sophisticated business models to evade law enforcement.

What is a bulletproof hosting provider?

A bulletproof hosting provider is a service that offers web hosting to cybercriminals, often operating with minimal oversight to facilitate illegal activities.

TREND MICRO INC S/ADR

OTC:TMICY

TMICY Rankings

TMICY Latest News

TMICY Stock Data

7.39B
131.19M
0.01%
Software - Infrastructure
Technology
Link
United States of America
Tokyo