Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Russian-linked Malware Campaign Hides in Blender 3D Files

November 24, 2025

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 2025

Flaws Expose Risks in Fluent Bit Logging Agent

November 24, 2025
Facebook X (Twitter) Instagram
Tuesday, November 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CISA Issues New Guidance on Bulletproof Hosting Threat
News

CISA Issues New Guidance on Bulletproof Hosting Threat

Team-CWDBy Team-CWDNovember 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new joint guide outlining how internet service providers and network defenders can curb cybercrime enabled by bulletproof hosting (BPH) infrastructure has been released by the US Cybersecurity and Infrastructure Security Agency (CISA) and its US and international partners.

The publication details how this infrastructure is used to support ransomware, phishing, malware delivery and other attacks targeting critical sectors.

CISA said the guide arrives as cybercriminals increasingly rely on bulletproof hosting services that ignore legal takedown requests and complaints.

These providers lease or resell infrastructure to malicious actors, allowing them to obfuscate operations, cycle through IP addresses and host illicit content while avoiding detection. Fast flux techniques, command and control activity, and data extortion schemes frequently run through these networks.

The authoring agencies recommended a series of defensive steps designed to reduce the effectiveness of BPH infrastructure. These measures focus on identifying malicious internet resources, improving traffic visibility and applying targeted filters that limit collateral impact on legitimate systems. 

Read more about sanctions against bulletproof hosters: UK, US and Australia Sanction Russian Bulletproof Hoster Media Land 

“Bulletproof hosting is one of the core enablers of modern cybercrime,” explained acting CISA director, Madhu Gottumukkala.

“By shining a light on these illicit infrastructures and giving defenders concrete actions, we are making it harder for criminals to hide and easier for our partners to protect the systems Americans rely on every day.”

Key recommendations include:

  • Curating a “high confidence” list of malicious internet resources

  • Conducting continuous traffic analysis

  • Implementing automated reviews of blocklists

  • Sharing threat intelligence across public and private channels

  • Deploying filters at the network edge

  • Establishing feedback processes to reduce accidental blocking

“Cybercriminals persist in their efforts to disrupt networks and systems while remaining undetectable and difficult to trace,” commented Nick Andersen, executive assistant director for CISA’s Cybersecurity Division.

“BPH providers are increasingly becoming common accomplices, posing an imminent and significant risk.”

ISPs are encouraged to notify customers about potential threats, offer optional filtering tools and establish sector-wide standards for BPH abuse prevention.

The guide notes that applying these measures could force cybercriminals to turn to legitimate infrastructure providers that respond to law enforcement and abuse reports.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy
Next Article Find your weak spots before attackers do
Team-CWD
  • Website

Related Posts

News

Russian-linked Malware Campaign Hides in Blender 3D Files

November 24, 2025
News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 2025
News

Flaws Expose Risks in Fluent Bit Logging Agent

November 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

How to help older family members avoid scams

October 31, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.