WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts (TLP:CLEAR) CISA Report - Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) CISA Report – Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers

TLP:CLEAR

Author: Alec Davison

Created: Thursday, November 20, 2025 - 17:31

Categories: Cybersecurity, Security Preparedness

Summary: Yesterday, CISA, in collaboration with U.S. and international partners, released a report “Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers.” The guide offers internet service providers (ISPs) and network defenders with an overview of this cybercriminal activity along with key steps, best practices, and resources to protect their customers and their networks.

Analyst Note: According to the report, cybercriminal actors are increasingly using bulletproof hosting (BPH) infrastructure to support cyber attacks against critical infrastructure and other high-value targets. BPH providers market their infrastructure as “bulletproof” to cybercriminals because they neither engage in good faith with legal processes nor with third-party or victim complaints of malicious activity enabled from such infrastructure.

Threat actors leverage BPH infrastructure for obfuscation via fast flux techniques, command and control, malware delivery, phishing, and hosting illicit content in support of a variety of malicious cyber activities, such as ransomware, data extortion, and denial of service (DoS) attacks.

To reduce your cyber risk, network defenders and ISPs are encouraged to apply the mitigations recommended in this guide. These include conducting traffic analysis, curating a list of “high confidence” malicious internet resources, and performing automated and regular reviews of the malicious internet resources list.

Visit StopRansomware.gov to learn more about other ransomware threats and access no-cost tools and resources offered by CISA, FBI, and other US government partners.

Original Source: https://www.cisa.gov/news-events/alerts/2025/11/19/cisa-releases-guide-mitigate-risks-bulletproof-hosting-providers

Additional Reading:

  • (TLP:AMBER) Gate 15 Threat Awareness & Resilience Guidance Report: Cybercrime (24 February 2025)

Related WaterISAC PIRs: 6, 8, 12

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar