Bulletproof Hosting Defense: Mitigating the Proxy Threat with Threat Intelligence
auth0.com·12h
🛡️Cybersecurity
Preview
Report Post

Bulletproof hosting (BPH) providers are a staple in adversaries’ toolkits, offering access to shared infrastructure where abuse complaints are willfully ignored. These services provide attackers with vast pools of leased IP addresses to mask their true origin, a tactic essential for launching automated attacks like credential stuffing against Identity and Access Management (IAM) systems.

The Joint Ransomware Task Force (JRTF) recently published a guide for how network defenders can manage traffic from these services. While Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers, is aimed broadly at network defenders, tracking adversary infrastructure also provides critical signals for IAM teams — specifically those prote…

Similar Posts

Loading similar posts...