Bulletproof Hosting
   HOME

TheInfoList



OR:

Bulletproof hosting (BPH) is technical infrastructure service provided by an
Internet hosting service An Internet hosting service is a service that runs servers connected to the Internet, allowing organizations and individuals to serve content or host services connected to the Internet. A common kind of hosting is web hosting. Most hosting provi ...
that is resilient to complaints of illicit activities, which serves criminal actors as a basic building block for streamlining various
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
s. BPH providers allow
online gambling Online gambling is any kind of gambling conducted on the internet. This includes virtual poker, casinos and sports betting. The first online gambling venue opened to the general public was ticketing for the Liechtenstein International Lottery i ...
,
illegal pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
, botnet command and control servers, spam, copyrighted materials, hate speech and
misinformation Misinformation is incorrect or misleading information. It differs from disinformation, which is ''deliberately'' deceptive. Rumors are information not attributed to any particular source, and so are unreliable and often unverified, but can turn ...
, despite takedown court orders and
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules Rule or ruling may refer to: Education ...
subpoena A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
s, allowing such material in their acceptable use policies. BPH providers usually operate in jurisdictions which have lenient laws against such conduct. Most non-BPH service providers prohibit transferring materials over their network that would be in violation of their terms of service and the local laws of the incorporated jurisdiction, and oftentimes any abuse reports would result in takedowns to avoid their autonomous system's IP block being blacklisted by other providers and by
Spamhaus The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name ''spamhaus'', a pseudo-German expression, was coined by Linf ...
.


History

BPH was first became the subject of research in 2006 when security researchers from
VeriSign Verisign Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and gene ...
revealed the
Russian Business Network The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the ...
, an internet service provider that hosted a phishing group responsible for about $150 million in phishing-related scams. RBN also become known for
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
s, child pornography, and botnets. The following year,
McColo McColo was a US-based web hosting service provider that was, for a long time, the source of the majority of spam-sending activities for the entire world. In late 2008, the company was shut down by two upstream providers, Global Crossing and Hur ...
, the web hosting provider responsible for more than 75% of global spam was shut down and de-peered by
Global Crossing Global Crossing was a telecommunications company that provided computer networking services and operated a tier 1 carrier. It maintained a large backbone network and offered peering, virtual private networks, leased lines, audio and video con ...
and
Hurricane Electric Hurricane Electric is a global Internet service provider offering internet transit, tools, and network applications, as well as data center colocation and hosting services at 2 locations in Fremont, California, where the company is based. Acco ...
after the public disclosure by then-
Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large na ...
reporter
Brian Krebs Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 28, ...
on his Security Fix blog on that newspaper.


Difficulties

Since any abuse reports to the BPH will be disregarded, in most cases, the whole IP block ("netblock") assigned to the BPH's autonomous system will be blacklisted by other providers and third party spam filters. Additionally, BPH also have difficulty in finding network peering points for establishing
Border Gateway Protocol Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. BGP is classified as a path-vector routing protocol, and it make ...
sessions, since routing a BPH provider's network can affect the reputation of upstream autonomous systems and transit provider. This makes it difficult for BPH services to provide stable network connectivity, and in extreme cases, they can be completely de-peered; therefore BPH providers evade AS's reputation based fortification such as BGP Ranking and ASwatch through unconventional methodologies.


Web hosting reseller

According to a report, due to their mounting difficulties, BPH providers engage in establishing
reseller A reseller is a company or individual (merchant) that purchases goods or services with the intention of selling them rather than consuming or using them. This is usually done for profit (but can be done at a loss). One example can be found in the ...
relationships with lower-end hosting providers; although these providers are not complicit in supporting the illegitimate activities, they tend to be lenient on abuse reports and do not actively engage in
fraud detection In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensa ...
. Therefore, BPH conceals itself behind lower-end hosting providers, leveraging their better reputation and simultaneously operating both bulletproof and legitimate resells through the sub-allocated network blocks. However, if the BPH services are caught, providers of BPH migrate their clients to a newer internet infrastructure—newer lower-end AS, or IP space—effectively making the blacklisted IP addresses of the previous AS ephemeral; thus continuing to engage in criminal conduct by modifying the DNS server's resource records of the listening services and making it point to the newer IP addresses belonging to the current AS's IP space. Due to privacy concerns, the customary modes of contact for BPH providers include ICQ,
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, deb ...
, and
XMPP Extensible Messaging and Presence Protocol (XMPP, originally named Jabber) is an open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Extensible Markup Language), i ...
(or
Jabber Jabber may refer to: * The original name of the Extensible Messaging and Presence Protocol (XMPP), the open technology for instant messaging and presence. * Jabber.org, the public, free instant messaging and presence service based on XMPP. * Jabber ...
).


Admissible abuses

Most BPH providers promise immunity against
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
and court order takedown notices, notably
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA),
Electronic Commerce Directive The e-Commerce Directive, adopted in 2000, sets up an Internal Market framework for online services. Its aim is to remove obstacles to cross-border online services in the EU internal market and provide legal certainty for businesses and consumer ...
(ECD) and law enforcement subpoenas. They also allow users to operate
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwa ...
,
scam A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, confidence, irresponsibility, and greed. Researchers hav ...
s (such as
high-yield investment program A high-yield investment program (HYIP) is a type of Ponzi scheme, an investment scam that promises unsustainably high return on investment by paying previous investors with the money invested by new investors. Mechanics Operators generally se ...
), botnet masters and unlicensed online pharmacy websites. In these cases, the BPH providers (known as " offshore providers") operate in jurisdictions which do not have any
extradition treaty Extradition is an action wherein one jurisdiction delivers a person accused or convicted of committing a crime in another jurisdiction, over to the other's law enforcement. It is a cooperative law enforcement procedure between the two jurisdic ...
or
mutual legal assistance treaty A mutual legal assistance treaty (MLAT) is an agreement between two or more countries for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws. A mutual legal assistance request is commonly used to fo ...
(MLAT) signed with the five eye countries, particularly the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
. However, most BPH providers have a zero-tolerance policy towards
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
and
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
, although a few allow cold storage of such material given forbidden open-accessibility via the public
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Prevalent jurisdictions for incorporation and location of the data centers for BPH providers include
Russia Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-eig ...
(being more permissive),
Ukraine Ukraine ( uk, Україна, Ukraïna, ) is a country in Eastern Europe. It is the second-largest European country after Russia, which it borders to the east and northeast. Ukraine covers approximately . Prior to the ongoing Russian inv ...
, China,
Moldova Moldova ( , ; ), officially the Republic of Moldova ( ro, Republica Moldova), is a landlocked country in Eastern Europe. It is bordered by Romania to the west and Ukraine to the north, east, and south. The unrecognised state of Transnistr ...
,
Romania Romania ( ; ro, România ) is a country located at the crossroads of Central, Eastern, and Southeastern Europe. It borders Bulgaria to the south, Ukraine to the north, Hungary to the west, Serbia to the southwest, Moldova to the east, and ...
,
Bulgaria Bulgaria (; bg, България, Bǎlgariya), officially the Republic of Bulgaria,, ) is a country in Southeast Europe. It is situated on the eastern flank of the Balkans, and is bordered by Romania to the north, Serbia and North Macedo ...
,
Belize Belize (; bzj, Bileez) is a Caribbean and Central American country on the northeastern coast of Central America. It is bordered by Mexico to the north, the Caribbean Sea to the east, and Guatemala to the west and south. It also shares a wate ...
,
Panama Panama ( , ; es, link=no, Panamá ), officially the Republic of Panama ( es, República de Panamá), is a transcontinental country spanning the southern part of North America and the northern part of South America. It is bordered by Co ...
and the
Seychelles Seychelles (, ; ), officially the Republic of Seychelles (french: link=no, République des Seychelles; Creole: ''La Repiblik Sesel''), is an archipelagic state consisting of 115 islands in the Indian Ocean. Its capital and largest city, ...
.


Impacts

BPH services act as vital network infrastructure providers for activities such as cybercrime and online illicit economies, and the well-established working model of the cybercrime economies surrounds upon tool development and skill-sharing among peers. The development of exploits, such as zero-day vulnerabilities, are done by a very small community of highly-skilled actors, who encase them in convenient tools which are usually bought by low-skilled actors (known as
script kiddie A script kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes. Characteristics In a Carnegie Mellon report prepared for the U.K. Department of Defense in 2 ...
s), who make use of BPH providers for carry out
cyberattacks A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
, usually targeting low-profile unpretentious network services and individuals. According to a report produced by Carnegie Mellon University for the
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
, low-profile amateur actors are also potent in causing harmful consequences, especially to small businesses, inexperienced internet users, and miniature servers. Criminal actors also run specialized computer programs on BPH providers knowns as
port scanner A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host ...
s which scan the entire IPv4 address space for open ports, services run on those open ports, and the
version Version may refer to: Computing * Software version, a set of numbers that identify a unique evolution of a computer program * VERSION (CONFIG.SYS directive), a configuration directive in FreeDOS Music * Cover version * Dub version * Remix * ''Ve ...
of their service daemons, searching for vulnerable versions for exploitation. One such notable vulnerability scanned by the port scanners is
Heartbleed Heartbleed was a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbl ...
, which affected millions of internet servers. Furthermore, BPH clients also host
click fraud Click, Klick and Klik may refer to: Airlines * Click Airways, a UAE airline * Clickair, a Spanish airline * MexicanaClick, a Mexican airline Art, entertainment, and media Fictional characters * Klick (fictional species), an alien race in t ...
,
adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
(such as DollarRevenue), and money laundering recruitment sites, which lure untried internet users into
honey trapping Honey trapping is an investigative practice involving the use of romantic or sexual relationships for interpersonal, political (including state espionage), or monetary purpose. The ''honey pot or trap'' involves making contact with an individua ...
and causing financial losses to the individuals while unrestrictedly keeping their illicit sites online, despite
court orders A court order is an official proclamation by a judge (or panel of judges) that defines the legal relationships between the parties to a hearing, a trial, an appeal or other court proceedings. Such ruling requires or authorizes the carrying out of ...
and takedown attempts by
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules Rule or ruling may refer to: Education ...
.


Counterinitiatives against BPH

The Spamhaus Project The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name ''spamhaus'', a pseudo-German expression, was coined by Linf ...
is an international nonprofit organization that monitors cyber threats and provides realtime blacklist reports (known as the "Badness Index") on malicious ASs, netblocks, and
registrar A registrar is an official keeper of records made in a register. The term may refer to: Education * Registrar (education), an official in an academic institution who handles student records * Registrar of the University of Oxford, one of the se ...
s that are involved in spam, phishing, or cybercrime activities. The Spamhaus team works closely with law enforcement agencies such as
National Cyber-Forensics and Training Alliance The National Cyber-Forensics & Training Alliance or NCFTA established in 2002 in Pittsburgh is an American non-profit corporation focused on identifying, mitigating, and neutralizing cyber crime threats through strategic alliances and partnerships ...
(NCFTA) and
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI), and the data compiled by Spamhaus is used by the majority of the
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s, email service providers,
corporation A corporation is an organization—usually a group of people or a company—authorized by the state to act as a single entity (a legal entity recognized by private and public law "born out of statute"; a legal person in legal context) and ...
s, educational institutes, governments and uplink gateways of military networks. Spamhaus publishes various
data feed Data feed is a mechanism for users to receive updated data from data sources. It is commonly used by real-time applications in point-to-point settings as well as on the World Wide Web. The latter is also called web feed. News feed is a popular for ...
s that list netblocks of the criminal actors, and is designed for use by gateways, firewalls and routing equipments to filter out (or " nullroute") traffic originating from these netblocks: * Spamhaus Don't Route Or Peer List (DROP) lists netblocks allocated by an established Regional Internet Registry (RIR) or National Internet Registry (NIR) that are used by criminal actors, and doesn't include abused IP address spaces sub-allocated netblocks of a reputable AS. * Spamhaus Domain Block List (DBL) lists domain names with poor reputation in DNSBL format. * Spamhaus Botnet Controller List (BCL) lists single IPv4 addresses of botnet masters.


Notable closed services

The following are some of the notable defunct BPH providers: * CyberBunker, taken down in September 2019. *
McColo McColo was a US-based web hosting service provider that was, for a long time, the source of the majority of spam-sending activities for the entire world. In late 2008, the company was shut down by two upstream providers, Global Crossing and Hur ...
, taken down in November 2008. *
Russian Business Network The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the ...
(RBN), taken down in November 2007. * Atrivo, taken down in September 2008. * 3FN, taken down by FTC in June 2009. * Proxiez, taken down in May 2010.'Bulletproof' ISP for crimeware gangs knocked offline
, ''The Register'', May 2010.


See also

* Freedom Hosting * Fast flux *
Security theater Security theater is the practice of taking security measures that are considered to provide the feeling of improved security while doing little or nothing to achieve it. Disadvantages By definition, security theater provides no security benefit ...


References


Bibliography

* * * * * * * * * {{DEFAULTSORT:Bulletproof Hosting Web hosting Spamming Cybercrime