
Bulletproof hosting (BPH) is
technical infrastructure service provided by an
internet hosting service
An Internet hosting service is a service that runs servers connected to the Internet, allowing organizations and individuals to serve content or host services connected to the Internet.
A common kind of hosting is web hosting. Most hosting provi ...
that is resilient to complaints of
illicit activities, which serves
criminal actors as a basic building block for streamlining various
cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.
The rising dependence on increasingly complex and inte ...
s. BPH providers allow
online gambling
Online gambling (also known as iGaming or iGambling) is any kind of gambling conducted on the internet. This includes virtual poker, casinos, and sports betting. The first online gambling venue opened to the general public was ticketing for th ...
,
illegal pornography,
botnet command and control servers,
spam
Spam most often refers to:
* Spam (food), a consumer brand product of canned processed pork of the Hormel Foods Corporation
* Spamming, unsolicited or undesired electronic messages
** Email spam, unsolicited, undesired, or illegal email messages
...
,
copyrighted materials,
hate speech
Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
and
misinformation
Misinformation is incorrect or misleading information. Misinformation and disinformation are not interchangeable terms: misinformation can exist with or without specific malicious intent, whereas disinformation is distinct in that the information ...
, despite
takedown court orders and
law enforcement
Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
subpoena
A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
s, allowing such material in their
acceptable use policies.
BPH providers usually operate in jurisdictions which have lenient laws against such conduct. Most non-BPH service providers prohibit transferring materials over their network that would be in violation of their
terms of service and the local laws of the
incorporated jurisdiction, and oftentimes any
abuse reports would result in takedowns to avoid their
autonomous system's
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
block being
blacklisted
Blacklisting is the action of a group or authority compiling a blacklist of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list; if people are on a blacklist, then they are considere ...
by other providers and by
Spamhaus.
History
BPH first became the subject of research in 2006 when security researchers from
VeriSign
Verisign, Inc. is an American company based in Reston, Virginia, that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and generic top-level d ...
revealed the
Russian Business Network, an internet service provider that hosted a phishing group, was responsible for about $150 million in phishing-related scams. RBN also become known for
identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
s, child pornography, and botnets. The following year,
McColo, the web hosting provider responsible for more than 75% of global spam was shut down and de-peered by
Global Crossing
Global Crossing Limited was a telecommunications company that provided computer networking services and operated a tier 1 carrier. It maintained a large backbone network and offered peering, virtual private networks, leased lines, audio and vid ...
and
Hurricane Electric after the public disclosure by then-
Washington Post
''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington m ...
reporter
Brian Krebs
Brian Krebs (born 1972) is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals.Perlroth, Nicole.Reporting From the Web's Underbelly. ''The New York Times''. Retrieved February 2 ...
on his Security Fix blog on that newspaper.
Difficulties
Since any abuse reports to the BPH will be disregarded, in most cases, the whole
IP block ("netblock") assigned to the BPH's
autonomous system will be blacklisted by other providers and
third party spam filters. Additionally, BPH also have difficulty in finding
network peering points for establishing
Border Gateway Protocol
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. BGP is classified as a path-vector routing protocol, and it ...
sessions, since routing a BPH provider's network can affect the reputation of
upstream autonomous systems and
transit provider.
This makes it difficult for BPH services to provide stable network connectivity, and in extreme cases, they can be completely de-peered; therefore BPH providers evade AS's reputation based fortification such as BGP Ranking and ASwatch through unconventional methodologies.
Web hosting reseller
According to a report, due to their mounting difficulties, BPH providers engage in establishing
reseller
A reseller is a company or individual ( merchant) that purchases goods or services with the intention of selling them rather than consuming or using them. Individual resellers are often referred to as middle men. This is usually done for profit ( ...
relationships with
lower-end hosting providers; although these providers are not complicit in supporting the illegitimate activities, they tend to be lenient on abuse reports and do not actively engage in
fraud detection
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
. Therefore, BPH conceals itself behind lower-end hosting providers, leveraging their better reputation and simultaneously operating both bulletproof and legitimate resells through the sub-allocated network blocks. However, if the BPH services are caught, providers of BPH migrate their clients to a newer internet infrastructure—newer lower-end AS, or IP space—effectively making the blacklisted IP addresses of the previous AS ephemeral; thus continuing to engage in criminal conduct by modifying the
DNS server
A name server is a computer application that implements a network service for providing responses to queries against a directory service. It translates an often humanly meaningful, text-based identifier to a system-internal, often numeric identi ...
's
resource records of the
listening services and making it point to the newer IP addresses belonging to the current AS's IP space. Due to privacy concerns, the customary modes of contact for BPH providers include
ICQ,
Skype
Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
, and
XMPP
Extensible Messaging and Presence Protocol (abbreviation XMPP, originally named Jabber) is an Open standard, open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Ext ...
(or
Jabber).
Admissible abuses
Most BPH providers promise immunity against
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
and
court order takedown notices, notably
Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA),
Electronic Commerce Directive (ECD) and
law enforcement subpoenas. They also allow users to operate
phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
,
scam
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their Trust (emotion), trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence ...
s (such as
high-yield investment program),
botnet masters and unlicensed
online pharmacy websites. In these cases, the BPH providers (known as "
offshore providers") operate in jurisdictions which do not have any
extradition treaty
In an extradition, one jurisdiction delivers a person accused or convicted of committing a crime in another jurisdiction, into the custody of the other's law enforcement. It is a cooperative law enforcement procedure between the two jurisdic ...
or
mutual legal assistance treaty
A mutual legal assistance treaty (MLAT) is an agreement between two or more countries for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws. A mutual legal assistance request is commonly used to fo ...
(MLAT) signed with the
five eye countries, particularly the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. However, most BPH providers have a zero-tolerance policy towards
child pornography
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
and
terrorism
Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
, although a few allow
cold storage of such material given forbidden open-accessibility via the public
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
.
Prevalent jurisdictions for
incorporation and location of the
data center
A data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems.
Since IT operations are crucial for busines ...
s for BPH providers include
Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
(being more permissive),
Ukraine
Ukraine is a country in Eastern Europe. It is the List of European countries by area, second-largest country in Europe after Russia, which Russia–Ukraine border, borders it to the east and northeast. Ukraine also borders Belarus to the nor ...
,
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
,
Moldova
Moldova, officially the Republic of Moldova, is a Landlocked country, landlocked country in Eastern Europe, with an area of and population of 2.42 million. Moldova is bordered by Romania to the west and Ukraine to the north, east, and south. ...
,
Romania
Romania is a country located at the crossroads of Central Europe, Central, Eastern Europe, Eastern and Southeast Europe. It borders Ukraine to the north and east, Hungary to the west, Serbia to the southwest, Bulgaria to the south, Moldova to ...
,
Bulgaria
Bulgaria, officially the Republic of Bulgaria, is a country in Southeast Europe. It is situated on the eastern portion of the Balkans directly south of the Danube river and west of the Black Sea. Bulgaria is bordered by Greece and Turkey t ...
,
Belize
Belize is a country on the north-eastern coast of Central America. It is bordered by Mexico to the north, the Caribbean Sea to the east, and Guatemala to the west and south. It also shares a maritime boundary with Honduras to the southeast. P ...
,
Panama
Panama, officially the Republic of Panama, is a country in Latin America at the southern end of Central America, bordering South America. It is bordered by Costa Rica to the west, Colombia to the southeast, the Caribbean Sea to the north, and ...
and the
Seychelles
Seychelles (, ; ), officially the Republic of Seychelles (; Seychellois Creole: ), is an island country and archipelagic state consisting of 155 islands (as per the Constitution) in the Indian Ocean. Its capital and largest city, Victoria, ...
.
Impacts
BPH services act as vital network infrastructure providers for activities such as cybercrime and
online illicit economies, and the well-established working model of the cybercrime economies surrounds upon
tool development and
skill-sharing among peers. The development of
exploits, such as
zero-day vulnerabilities, are done by a very small community of
highly-skilled actors, who encase them in
convenient tools which are usually bought by low-skilled actors (known as
script kiddie
A script kiddie, skript kiddie, skiddie, kiddie, or skid is a pejorative term used to describe an unskilled individual who uses malicious scripts or programs developed by others or LLMs.
Characteristics
The term script kiddie was first used in ...
s), who make use of BPH providers to carry out
cyberattacks, usually targeting low-profile unsophisticated
network service
In computer networking, a network service is an application running at the network layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client–server or pe ...
s and individuals. According to a report produced by
Carnegie Mellon University
Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania, United States. The institution was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools. In 1912, it became the Carnegie Institu ...
for the
United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
, low-profile amateur actors are also potent in causing harmful consequences, especially to
small business
Small businesses are types of corporations, partnerships, or sole proprietorships which have a small number of employees and/or less annual revenue than a regular-sized business or corporation. Businesses are defined as "small" in terms of being ...
es,
inexperienced internet users, and miniature
servers.
Criminal actors also run specialized computer programs on BPH providers knowns as
port scanners which scan the entire
IPv4
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. ...
address space
In computing, an address space defines a range of discrete addresses, each of which may correspond to a network host, peripheral device, disk sector, a memory cell or other logical or physical entity.
For software programs to save and retrieve ...
for
open ports, services run on those open ports, and the
version
Version may refer to:
Computing
* Software version, a set of numbers that identify a unique evolution of a computer program
* VERSION (CONFIG.SYS directive), a configuration directive in FreeDOS
Music
* Cover version
* Dub version
* Remix
* ''V ...
of their
service daemons, searching for
vulnerable versions for exploitation. One such notable vulnerability scanned by the port scanners is
Heartbleed
Heartbleed is a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclos ...
, which affected millions of internet servers. Furthermore, BPH clients also host
click fraud
Click fraud is a type of ad fraud that occurs on the Internet in pay per click (PPC) online advertising. In this type of advertising, the owners of websites that post the ads are paid based on how many site visitors click on the ads. Fraud occurs ...
,
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue by automatically displaying Online advertising, online advertisements in the user interface or on a screen presented during the installatio ...
(such as
DollarRevenue), and
money laundering
Money laundering is the process of illegally concealing the origin of money obtained from illicit activities (often known as dirty money) such as drug trafficking, sex work, terrorism, corruption, and embezzlement, and converting the funds i ...
recruitment sites, which lure credulous internet users into honey traps and cause financial losses to the individuals while keeping their illicit sites online, despite
court orders
A court is an institution, often a government entity, with the authority to adjudicate legal disputes between parties and administer justice in civil, criminal, and administrative matters in accordance with the rule of law.
Courts genera ...
and takedown attempts by
law enforcement
Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
.
Counterinitiatives against BPH
The Spamhaus Project
The Spamhaus Project is an international organisation based in the Principality of Andorra, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name ''spamhaus'', a pseudo-German expression, was coined by Li ...
is an
international nonprofit organization that monitors cyber threats and provides realtime
blacklist reports (known as the "Badness Index") on malicious ASs, netblocks, and
registrars that are involved in spam, phishing, or cybercrime activities. The Spamhaus team works closely with law enforcement agencies such as
National Cyber-Forensics and Training Alliance (NCFTA) and
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI), and the data compiled by Spamhaus is used by the majority of the
ISPs,
email service providers,
corporation
A corporation or body corporate is an individual or a group of people, such as an association or company, that has been authorized by the State (polity), state to act as a single entity (a legal entity recognized by private and public law as ...
s,
educational institutes, governments and
uplink gateways of military networks. Spamhaus publishes various
data feed
Data feed is a mechanism for users to receive updated data from data sources. It is commonly used by real-time applications in point-to-point settings as well as on the World Wide Web. The latter is also called web feed. News feed is a popular for ...
s that list netblocks of the criminal actors, and is designed for use by
gateways,
firewalls and
routing equipments to
filter out (or "
nullroute") traffic originating from these netblocks:
* Spamhaus Don't Route Or Peer List (DROP) lists netblocks allocated by an established
Regional Internet Registry
A regional Internet registry (RIR) is an organization that manages the allocation and registration of Internet number resources within a region of the world. Internet number resources include IP addresses and autonomous system (AS) numbers.
...
(RIR) or
National Internet Registry (NIR) that are used by criminal actors, and doesn't include abused IP address spaces sub-allocated netblocks of a reputable AS.
* Spamhaus Domain Block List (DBL) lists domain names with poor reputation in
DNSBL format.
* Spamhaus Botnet Controller List (BCL) lists single IPv4 addresses of botnet masters.
Notable closed services
The following are some of the notable defunct BPH providers:
*
CyberBunker, taken down in September 2019.
*
McColo, taken down in November 2008.
*
Russian Business Network (RBN), taken down in November 2007.
* Atrivo, taken down in September 2008.
* 3FN, taken down by FTC in June 2009.
* Proxiez, taken down in May 2010.
'Bulletproof' ISP for crimeware gangs knocked offline
, ''The Register'', May 2010.
See also
* Freedom Hosting
* Fast flux
* Security theater
References
Bibliography
*
*
*
*
*
*
*
*
*
{{DEFAULTSORT:Bulletproof Hosting
Web hosting
Spamming
Cybercrime