VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

Running a cybercriminal enterprise isn't all that easy. Try, for instance, setting up a site hosting malware and you'll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests.

Though the most infamous BPH operation, the Russian Business Network (RBN), was disconnected from the Internet several years ago, other BPH operators remain important facilitators for various kinds of cybercrime. This makes the paper 'BPH exposed – RBN never left they just adapted and evolved. Did you?', which Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) will present at VB2017 in Madrid, all the more important.

In their paper, Dhia and Jason take both an actor-centric and a network-centric approach to analysing BPH services. They combine access to vetted closed underground forums with network analysis (including DNS, IP, BGP and WHOIS data) to detail multiple sophisticated BPH operators. Given the crucial role BPH plays in cybercrime, the paper and the presentation will be very relevant for all security researchers.

VB2017-325w.jpg

Don't forget that registration for the conference is still open. And if the subject of BPH interests you, you should make a note to attend Neil Schwartzman's Small Talk 'WHOIS in peril?' on the consequences the GDPR will have for the WHOIS protocol.

On the subject of taking a network-centric approach to analysing rogue networks, Dhia presented the paper 'Sweeping the IP space: the hunt for evil on the Internet' at VB2014 in Seattle. You can find the video of his presentation below.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Didn't come to VB2017? Tell us why!

Virus Bulletin is a company - and a conference - with a mission: to further the research in and facilitate the fight against digital threats. To help us in this mission, we want to hear from those who didn't come to Madrid. What is your impression of…

Montreal will host VB2018

Last week, we announced the full details of VB2018, which will take place 3-5 October 2018 at the Fairmont The Queen Elizabeth hotel in Montreal, Quebec, Canada.

VB2017 preview: Beyond lexical and PDNS (guest blog)

In a special guest blog post, VB2017 Silver sponsor Cisco Umbrella writes about a paper that researchers Dhia Mahjoub and David Rodriguez will present at the conference this Friday.

Avast to present technical details of CCleaner hack at VB2017

The recently discovered malicious CCleaner version has become one of the biggest security stories of 2017. Two researchers from Avast, the company that had recently acquired CCleaner developer Piriform, will share the results of their investigations…

VB2017 preview: Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

We preview the VB2017 paper by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Costin Raiu on fourth-party collection and its implications for attack attribution.