VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

Running a cybercriminal enterprise isn't all that easy. Try, for instance, setting up a site hosting malware and you'll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests.

Though the most infamous BPH operation, the Russian Business Network (RBN), was disconnected from the Internet several years ago, other BPH operators remain important facilitators for various kinds of cybercrime. This makes the paper 'BPH exposed – RBN never left they just adapted and evolved. Did you?', which Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) will present at VB2017 in Madrid, all the more important.

In their paper, Dhia and Jason take both an actor-centric and a network-centric approach to analysing BPH services. They combine access to vetted closed underground forums with network analysis (including DNS, IP, BGP and WHOIS data) to detail multiple sophisticated BPH operators. Given the crucial role BPH plays in cybercrime, the paper and the presentation will be very relevant for all security researchers.

VB2017-325w.jpg

Don't forget that registration for the conference is still open. And if the subject of BPH interests you, you should make a note to attend Neil Schwartzman's Small Talk 'WHOIS in peril?' on the consequences the GDPR will have for the WHOIS protocol.

On the subject of taking a network-centric approach to analysing rogue networks, Dhia presented the paper 'Sweeping the IP space: the hunt for evil on the Internet' at VB2014 in Seattle. You can find the video of his presentation below.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2017 paper: Nine circles of Cerber

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool…

Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem.

Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks.

Security Planner gives security advice based on your threat model

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing.

VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017.