Global Coalition Targets 'Bulletproof' Hosting Services Fueling Cybercrime

NSA, CISA, FBI and International Partners Issue Joint Guidance to Dismantle Criminal 'Bulletproof' Hosting Providers

INFORMATIONAL
November 21, 2025
December 7, 2025
4m read
Policy and ComplianceThreat IntelligenceRegulatory

Related Entities(initial)

Products & Tech

Fast Flux DNS

Other

Internet Service Provider (ISP)

Full Report(when first published)

Executive Summary

In a significant international effort to disrupt the cybercrime ecosystem, cybersecurity agencies from the United States, United Kingdom, Australia, Canada, the Netherlands, and New Zealand have jointly issued guidance targeting 'bulletproof' hosting (BPH) providers. The advisory, published by the Joint Ransomware Task Force (JRTF), provides actionable recommendations for Internet Service Providers (ISPs), data centers, and network defenders to identify and mitigate the risks posed by these criminal enterprises. BPH providers are a cornerstone of modern cybercrime, knowingly leasing servers and IP addresses to threat actors for malicious operations, including ransomware C2, phishing sites, and botnets, while ignoring abuse complaints. The new guidance aims to make it harder and more expensive for criminals to operate by encouraging a collaborative, multi-faceted approach to dismantling this critical infrastructure.


Policy Details

The joint advisory, titled "Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers," was released on November 19, 2025, by a coalition including the NSA, CISA, FBI, and their international counterparts. It defines a BPH provider as an entity that willfully provides infrastructure for malicious activities and resists takedown requests.

The core problem is that BPH providers often operate by reselling infrastructure from legitimate, larger hosting companies. This makes simple IP-based blocking challenging, as it risks impacting legitimate services. Therefore, the guidance advocates for a more intelligence-driven approach.

Key Recommendations for ISPs and Network Defenders:

  1. Develop High-Confidence Lists: Use threat intelligence feeds, law enforcement data, and internal analysis to create and maintain high-confidence lists of malicious domains, IPs, and ASNs associated with BPH providers.
  2. Improve Vetting Processes: Enhance "Know Your Customer" (KYC) and "Know Your Business" (KYB) procedures to identify suspicious clients during onboarding. Red flags include payment in cryptocurrency, use of anonymized contact details, and requests for large blocks of IP space with no clear business purpose.
  3. Baseline Network Activity: Monitor for network traffic patterns indicative of malicious hosting, such as "fast flux" DNS, where a domain rapidly cycles through a large number of IP addresses to evade detection.
  4. Collaborate with Law Enforcement: Establish clear channels for reporting BPH activity to national and international law enforcement agencies to support coordinated takedown and enforcement actions.

Affected Organizations

The guidance is primarily directed at:

  • Internet Service Providers (ISPs): Who are urged to be more proactive in identifying and dropping traffic from malicious sources.
  • Data Center and Cloud Hosting Providers: Who are encouraged to strengthen customer vetting and abuse response processes to avoid unwittingly hosting criminal infrastructure.
  • Network Defenders: Security teams in all organizations are encouraged to use the guidance to better block and detect traffic to and from BPH providers.

Ultimately, the entire digital ecosystem is affected, as BPH providers are the foundation for a vast range of cyber threats targeting businesses, governments, and individuals.


Impact Assessment

A successful global effort to disrupt BPH providers would have a significant positive impact on cybersecurity:

  • Increased Cost and Friction for Attackers: By reducing the availability of anonymous, resilient hosting, criminals would be forced to use legitimate providers where they are more easily identified and shut down. This raises their operational costs and risks.
  • Disruption of Criminal Operations: Taking down BPH infrastructure can simultaneously disrupt numerous criminal campaigns, from ransomware to phishing, that rely on it for command and control or content hosting.
  • Improved Ecosystem Health: A proactive stance by ISPs and hosting providers would lead to a cleaner, safer internet, reducing the volume of malicious traffic and attacks.
  • Enhanced Public-Private Collaboration: The initiative fosters stronger collaboration between government agencies, law enforcement, and the private sector, which is essential for tackling a problem as complex as cybercrime infrastructure.

Compliance and Implementation Guidance

For network defenders in enterprises, the advisory provides a framework for action:

  1. Enrich Threat Intelligence: Subscribe to high-quality threat intelligence feeds that specifically track BPH providers, malicious ASNs, and known criminal IP ranges. Integrate this data into your firewall, proxy, and DNS filtering solutions.
  2. Implement Egress Filtering: Strictly control outbound network traffic. Block connections to known malicious destinations. Forcing DNS requests through a corporate DNS resolver that filters known-bad domains is a highly effective control.
  3. Hunt for Fast Flux: Monitor DNS logs for domains exhibiting fast flux characteristics (very low TTLs and rapid changes in associated IP addresses). This can be a strong indicator of a connection to a malicious C2 infrastructure. This is an application of D3-NTA: Network Traffic Analysis.
  4. Block, Don't Just Alert: For traffic associated with high-confidence indicators of BPH, move from an "alert-only" to a "block" posture. The risk of false positives is low, and the benefit of preventing a connection to a ransomware C2 is high.
  5. Report Abuse: When malicious activity is traced back to a specific hosting provider, use their abuse reporting channels. While BPH providers will ignore it, reporting to legitimate providers they resell from can be effective.

Timeline of Events

1
November 19, 2025
Joint advisory on mitigating risks from bulletproof hosting providers is published.
2
November 21, 2025
This article was published

Article Updates

December 7, 2025

Discovery of Indonesian gambling network abused as resilient C2 infrastructure for malware operators.

MITRE ATT&CK Mitigations

Implement aggressive egress filtering to block outbound connections to known malicious IP ranges and ASNs associated with BPH providers.

Use DNS filtering and web proxies to block access to domains known to be hosted on BPH infrastructure.

Audit

M1047enterprise

Regularly audit network logs for connections to suspicious destinations and patterns indicative of malicious hosting, such as Fast Flux DNS.

D3FEND Defensive Countermeasures

DNS Denylisting is a highly effective and resource-efficient method for enterprises to operationalize the guidance against bulletproof hosting. The tactical recommendation is to configure corporate DNS resolvers to subscribe to multiple, high-quality threat intelligence feeds that specifically identify domains associated with BPH, ransomware, phishing, and other criminal activities. Instead of relying solely on IP-based blocking, which can be brittle, DNS denylisting prevents the initial connection attempt from ever resolving to a malicious IP. This should be implemented as a blocking measure, not just for logging. This defense is particularly effective against threats that use techniques like Fast Flux DNS, as the domain itself is blocked regardless of which IP it resolves to. Security teams should prioritize feeds from trusted sources like CISA's Malware Next-Gen program, commercial threat intel providers, and information sharing and analysis centers (ISACs). This creates a powerful first line of defense, preventing endpoints from communicating with a vast majority of known-bad infrastructure with minimal performance impact.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Bulletproof HostingBPHCISANSAFBICybercrime InfrastructureThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading