• Follow Us On : 

Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses


Redaksi | Selasa,13 Oktober 2020 - 05:11:52 WIB
Dibaca: 738 kali 
Trend Micro Research Reveals Top Tactics to Disrupt Underground Hosting Businesses

Threat correlation and visibility creates effective means to render cybercrime profitless

CHINA - Media OutReach - 13 October 2020 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today released key ways to identify and disrupt criminal market operations to conclude a three-part report series on the underground hosting market.

In the report, researchers outline the infrastructure business approaches of attackers to help security teams and law enforcement agencies best recognize, defend against, and disrupt them.

Understanding criminal operations, motivations and business models is key to dismantling the bulletproof hosting industry on which the majority of global cybercrime is built.

"Increasingly, mature organizations have SOC and XDR capabilities, which means security teams today have moved into the realm of also being investigators," said Robert McArdle, director of forward-looking threat research at Trend Micro.

"At that level of security sophistication, you need to understand how the criminals operate to strategically defend against attackers. We hope this report provides insight into cybercriminal operations that can prove actionable for organizations and ultimately make hosters lose profits."

Bulletproof hosters (BPH) are the root of cybercriminal infrastructure and therefore use a sophisticated business model to outlast takedown efforts. These include flexibility, professionalism and offering a range of services to cater to an array of customer needs.

The report details several effective methods to help investigators identify underground hosters, including:

  • Identify which IP ranges are in public block deny lists, or those associated with a large number of public abuse requests, as those may be indicative of BPH.
  • Analyze autonomous system behavior and peering information patterns to flag activity that is likely associated to BPH.
  • Once one BPH host has been detected, use machine fingerprinting to detect others that may be linked to the same provider.

The report also lists methods for law enforcement agencies and businesses to disrupt underground hosting businesses, without necessarily needing to identify or takedown their servers. These include:

  • Submit properly documented abuse requests to the suspected underground hosting provider and upstream peers.
  • Add BPH network ranges to well-established deny lists.
  • Increase the operational costs of the BPH, to impair business stability.
  • Undermine the reputation of the BPH on the cybercrime underground: perhaps via covert accounts that call into question the security of the criminal hosting provider or discuss possible collaboration with authorities.

To read the full report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/cybercrime-and-digital-threats/inside-the-bulletproof-hosting-business-cybercrime-methods-opsec.

About Trend Micro
Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers with connected solutions across cloud workloads, endpoints, email, IIoT, and networks.

Our XGen™ security strategy powers our solutions with a cross-generational blend of threat-defense techniques that are optimized for key environments and leverage shared threat intelligence for better, faster protection. With over 6,700 employees in 65 countries, and the world's most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world www.trendmicro.com.hk.


Akses Wahanariau.com Via Mobile m.Wahanariau.com
Untuk Berbagi Berita / Informasi / Peristiwa
Silahkan SMS ke nomor HP : 085271472010
atau email ke alamat : [email protected]
Harap camtumkan detail data diri Anda
Pengutipan Berita dan Foto, Cantumkan Wahanariau.com Sebagai Sumber Tanpa Penyingkatan
TULIS KOMENTAR
BERITA TERKAIT
Rabu,18 September 2019

Trend Micro Highlights Security Risks of New Open Banking Regulation

FinTech changes could open up new attacks on organizations and consumers CHINA - 18 September

Rabu,20 Januari 2021

Advanced Cloud-Native Container Security Added to Trend Micros Cloud One Services Platform

Comprehensive cloud security services optimize protection without slowing DevOps HONG KONG SAR - 20

Selasa,04 Juni 2019

Trend Micro Partners with Market Leading Security Awareness Vendors to Offer Comprehensive Free Training Content

Organizations have access to free content to educate teams on critical threats HONG KONG, CHINA&nbs

Senin,08 Februari 2021

Qualtrics Employee Experience Trends Reveals Change Management Key to Employee Engagement in Hong Kong in 2021

Annual report finds top engagement drivers shifted significantly during 2020 HONG KONG SAR - 8 Febr

Jumat,24 Juli 2020

Trend Micro Announces Cloud Solution to Strengthen Misconfiguration Protection for Microsoft Azure

DevOps teams gain continuous cloud security visibility and cloud security posture management CHINA

Kamis,01 Agustus 2019

Trend Micro Study Reveals Criminal Abuses Of Twitter

Social network used for scams and malice, as well as a threat intelligence source CHINA - 31 July 2

BERITA LAINNYA
Sabtu,11 September 2021

Masyarakat Inhil Antusias Ikuti Vaksinasi Covid-19 Tajaan Kadin Riau dan OJK

TEMBILAHAN - Pelaksanaan vaksinasi massal Covid-19 yang ditaja oleh Kamar Dagang dan Industri (Kadin

Kamis,09 September 2021

Bupati Rohil Hadiri Rapat Bersama Gubernur Riau

ROHIL - Bupati Rokan Hilir Afrizal Sintong menghadiri acara rapat bersama beberapa kepala daerah yan

Kamis,09 September 2021

NCS Makes Triple Acquisitions in Singapore, Hong Kong and Australia to Boost Digital Capabilities and Fuel Growth Across the Region

ClayOPS, Velocity Business Solutions and Riley will join NCS NEXT to strengthen data analytics and c

BERGABUNG DI SINI
KABAR POPULER
IKUTI BERITA KAMI