VB2017 preview: BPH exposed - RBN never left they just adapted and evolved. Did you?

Posted by   Martijn Grooten on   Sep 25, 2017

Running a cybercriminal enterprise isn't all that easy. Try, for instance, setting up a site hosting malware and you'll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests.

Though the most infamous BPH operation, the Russian Business Network (RBN), was disconnected from the Internet several years ago, other BPH operators remain important facilitators for various kinds of cybercrime. This makes the paper 'BPH exposed – RBN never left they just adapted and evolved. Did you?', which Dhia Mahjoub (OpenDNS) and Jason Passwaters (Intel471) will present at VB2017 in Madrid, all the more important.

In their paper, Dhia and Jason take both an actor-centric and a network-centric approach to analysing BPH services. They combine access to vetted closed underground forums with network analysis (including DNS, IP, BGP and WHOIS data) to detail multiple sophisticated BPH operators. Given the crucial role BPH plays in cybercrime, the paper and the presentation will be very relevant for all security researchers.

VB2017-325w.jpg

Don't forget that registration for the conference is still open. And if the subject of BPH interests you, you should make a note to attend Neil Schwartzman's Small Talk 'WHOIS in peril?' on the consequences the GDPR will have for the WHOIS protocol.

On the subject of taking a network-centric approach to analysing rogue networks, Dhia presented the paper 'Sweeping the IP space: the hunt for evil on the Internet' at VB2014 in Seattle. You can find the video of his presentation below.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.