On November 19, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the FBI, NSA, and other domestic and international allies, released a new guide titled "Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers." This guidance addresses the critical role that Bulletproof Hosting (BPH) providers play in the cybercrime ecosystem by knowingly providing resilient hosting services for malicious infrastructure. The document outlines a series of technical and policy recommendations for Internet Service Providers (ISPs) and network defenders to identify, filter, and report BPH-related activity, aiming to increase the operational costs for cybercriminals and disrupt their campaigns.
The guide is not a formal regulation but a set of best-practice recommendations for the public and private sectors. It aims to create a collaborative defense against BPH providers, which are defined as entities that willfully provide infrastructure for malicious activities and are lenient on content policies, resist takedown requests, and often ignore abuse complaints.
The guidance is primarily aimed at:
The proliferation of BPH providers significantly lowers the barrier to entry for cybercriminals. By providing a safe haven for command-and-control (C2) servers, phishing sites, and malware distribution points, BPH services enable a vast range of cyber threats:
By making it harder for BPH providers to operate, the goal is to disrupt these criminal activities, forcing threat actors onto legitimate hosting platforms where they are more easily identified and subject to law enforcement action.
While not mandatory, adopting the recommendations in the CISA guide can significantly improve an organization's security posture. A prioritized action plan should include:
Filtering network traffic based on known malicious indicators (IPs, domains, ASNs) is a core recommendation of the guide.
Using an IPS to detect and block traffic matching signatures of malicious activity hosted on BPH services.
Using web filters to block categories of websites known to be associated with criminal activity.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats