In a significant international effort to disrupt the cybercrime ecosystem, cybersecurity agencies from the United States, United Kingdom, Australia, Canada, the Netherlands, and New Zealand have jointly issued guidance targeting 'bulletproof' hosting (BPH) providers. The advisory, published by the Joint Ransomware Task Force (JRTF), provides actionable recommendations for Internet Service Providers (ISPs), data centers, and network defenders to identify and mitigate the risks posed by these criminal enterprises. BPH providers are a cornerstone of modern cybercrime, knowingly leasing servers and IP addresses to threat actors for malicious operations, including ransomware C2, phishing sites, and botnets, while ignoring abuse complaints. The new guidance aims to make it harder and more expensive for criminals to operate by encouraging a collaborative, multi-faceted approach to dismantling this critical infrastructure.
The joint advisory, titled "Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers," was released on November 19, 2025, by a coalition including the NSA, CISA, FBI, and their international counterparts. It defines a BPH provider as an entity that willfully provides infrastructure for malicious activities and resists takedown requests.
The core problem is that BPH providers often operate by reselling infrastructure from legitimate, larger hosting companies. This makes simple IP-based blocking challenging, as it risks impacting legitimate services. Therefore, the guidance advocates for a more intelligence-driven approach.
Key Recommendations for ISPs and Network Defenders:
The guidance is primarily directed at:
Ultimately, the entire digital ecosystem is affected, as BPH providers are the foundation for a vast range of cyber threats targeting businesses, governments, and individuals.
A successful global effort to disrupt BPH providers would have a significant positive impact on cybersecurity:
For network defenders in enterprises, the advisory provides a framework for action:
D3-NTA: Network Traffic Analysis.Discovery of Indonesian gambling network abused as resilient C2 infrastructure for malware operators.
Implement aggressive egress filtering to block outbound connections to known malicious IP ranges and ASNs associated with BPH providers.
Use DNS filtering and web proxies to block access to domains known to be hosted on BPH infrastructure.
DNS Denylisting is a highly effective and resource-efficient method for enterprises to operationalize the guidance against bulletproof hosting. The tactical recommendation is to configure corporate DNS resolvers to subscribe to multiple, high-quality threat intelligence feeds that specifically identify domains associated with BPH, ransomware, phishing, and other criminal activities. Instead of relying solely on IP-based blocking, which can be brittle, DNS denylisting prevents the initial connection attempt from ever resolving to a malicious IP. This should be implemented as a blocking measure, not just for logging. This defense is particularly effective against threats that use techniques like Fast Flux DNS, as the domain itself is blocked regardless of which IP it resolves to. Security teams should prioritize feeds from trusted sources like CISA's Malware Next-Gen program, commercial threat intel providers, and information sharing and analysis centers (ISACs). This creates a powerful first line of defense, preventing endpoints from communicating with a vast majority of known-bad infrastructure with minimal performance impact.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats