Sample Rogue Hosters with a Dutch footprint (April 2018)
18
Dissemination
19
Law enforcement: Cross Jurisdictional Business Model
20
Law enforcement: Taking Down Bad Content
21
Law Enforcement Recommendations
22
Security Community Recommendations
23
Policy makers: Recommendations
24
Hosting Community Recommendations
25
Summary
26
References
27
Additional Related Work
Description:
Explore the behaviors and patterns of rogue hosting providers in this 39-minute conference talk from the Hack In The Box Security Conference. Delve into the critical role hosting providers play in enabling online businesses globally, while also being exploited by cybercriminals for ransomware, phishing, and other attacks. Learn about the challenges posed by legitimate-but-abused and bulletproof hosters, particularly relevant to The Netherlands with its major hosting infrastructures. Discover how threat intelligence efforts can identify and combat illegal and malicious content on the Internet. Examine the cyber threat intelligence cycle, including stakeholder identification, collection, processing, analysis, and dissemination. Gain insights into the Dutch hosting space and the multi-layered approach needed to address abused hosting providers. Understand the technical perspective on large-scale threat detection and threat intelligence using proven collection, analysis, and correlation techniques.
Read more