VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?

Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests.

Though the most infamous BPH operation, the Russian Business Network (RBN), was disconnected from the Internet several years ago, other BPH operators remain important facilitators for various kinds of cybercrime. This makes the

paper

‘BPH exposed – RBN never left they just adapted and evolved. Did you?’, which Dhia Mahjoub (

OpenDNS

) and Jason Passwaters (

Intel471

) will present at

VB2017

in Madrid, all the more important.

In their paper, Dhia and Jason take both an actor-centric and a network-centric approach to analysing BPH services. They combine access to vetted closed underground forums with network analysis (including DNS, IP, BGP and WHOIS data) to detail multiple sophisticated BPH operators. Given the crucial role BPH plays in cybercrime, the paper and the presentation will be very relevant for all security researchers.


VB2017-325w.jpg

Don’t forget that

registration

for the conference is still open. And if the subject of BPH interests you, you should make a note to attend Neil Schwartzman’s Small Talk ‘

WHOIS in peril?

‘ on the consequences the GDPR will have for the WHOIS protocol.

On the subject of taking a network-centric approach to analysing rogue networks, Dhia presented the

paper

‘Sweeping the IP space: the hunt for evil on the Internet’ at VB2014 in Seattle. You can find the video of his presentation below.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *