CISA and a coalition of U.S. and international partners this week published a practical playbook aimed at choking off a persistent enabler of organized cybercrime: bulletproof hosting (BPH) providers that knowingly lease infrastructure to threat actors and ignore abuse takedowns. The new Cybersecurity Information Sheet, titled Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers, delivers clear operational steps for Internet Service Providers (ISPs) and network defenders — from curating malicious resource lists and applying targeted filters to logging Autonomous System Numbers (ASNs) and sharing intelligence — with the explicit goal of reducing BPH utility while minimizing collateral impact to legitimate traffic. The guidance is being circulated jointly by CISA and a range of partners, and was publicized alongside statements from the National Security Agency and allied CERTs and law‑enforcement entities.
Bulletproof hosting providers are a specialized slice of the hosting market that markets itself on tolerance for abuse — offering customers anonymity, minimal or no response to abuse complaints, and infrastructure designed to resist takedown. That structure makes them attractive to ransomware operators, phishers, botnet controllers, and malware distributors. The problem is rising from two converging trends: (1) criminal ecosystems that monetize resilience — offering resilient DNS, fast‑flux capabilities, and anonymized payment and registration chains — and (2) an operating environment where ISPs, hosting providers, and device manufacturers have not uniformly adopted protective defaults or verifiable customer vetting. The risk is both tactical (immediate attacks hosted on BPH infrastructure) and systemic (criminal economies sustained by resilient infrastructure). International enforcement actions and sanctions against BPH services during 2025 show the scale and seriousness of the problem.
Immediate (0–7 days)
That said, the guide is not a silver bullet. Technical controls can force criminals to more costly hosting models, but they cannot by themselves eliminate the incentives that sustain BPH markets. Success requires:
Source: CISA CISA Releases Guide to Mitigate Risks from Bulletproof Hosting Providers | CISA
Background
Bulletproof hosting providers are a specialized slice of the hosting market that markets itself on tolerance for abuse — offering customers anonymity, minimal or no response to abuse complaints, and infrastructure designed to resist takedown. That structure makes them attractive to ransomware operators, phishers, botnet controllers, and malware distributors. The problem is rising from two converging trends: (1) criminal ecosystems that monetize resilience — offering resilient DNS, fast‑flux capabilities, and anonymized payment and registration chains — and (2) an operating environment where ISPs, hosting providers, and device manufacturers have not uniformly adopted protective defaults or verifiable customer vetting. The risk is both tactical (immediate attacks hosted on BPH infrastructure) and systemic (criminal economies sustained by resilient infrastructure). International enforcement actions and sanctions against BPH services during 2025 show the scale and seriousness of the problem. What CISA’s guide says — concise summary
The guide frames BPH as an imminent and significant risk to resilience and public safety, and advocates a layered, careful approach for ISPs and network defenders to blunt its effectiveness. Its core recommendations — presented as operational, low‑to‑moderate risk steps that can be implemented quickly — are:- Curate malicious resource lists using threat intelligence feeds and sharing channels to maintain up‑to‑date blocklists for domains, IPs, and ASNs.
- Apply filters that block malicious traffic at appropriate network choke points while preserving legitimate flows.
- Analyze traffic continuously for anomalies and use telemetry to refine blocklists and filter rules.
- Log and alert on ASNs and IPs, keep logs current, and use those records to escalate to upstream providers or law enforcement.
- Share intelligence with public and private partners to accelerate remediation and takedown actions.
- Customer notification and opt‑out options when filters or blocklists might affect legitimate customers.
- Providing premade filters for customers to deploy in their networks.
- Establishing accountability standards and codes of conduct with peer ISPs to reduce abuse.
- Collecting and verifying customer identity to prevent BPH actors from leasing infrastructure anonymously.
Why this matters now
Multiple contemporaneous signals make the guide timely and necessary:- Governments and law enforcement are increasingly moving from ad hoc takedowns toward coordinated disruption and sanctions against BPH networks — a trend underscored by recent multi‑jurisdictional seizures and penalties. These enforcement steps reduce BPH capacity in the short term but do not remove the root causes that produce new BPH offerings.
- Attackers exploit resilience features — fast flux, dynamic DNS rotation, and anonymized proxies — to hide command‑and‑control and hosting for malware, and to complicate takedown. CISA and partner advisories on fast‑flux and related techniques have repeatedly documented how these behaviors frustrate traditional IP‑based blocking.
- Cloud providers and CDNs have demonstrated strong mitigation capability for high‑profile, volumetric events, but smaller providers and edge ISPs remain exposed; BPH infrastructure often sits in the regions and providers least prepared to act quickly and cooperatively. Operational best practices for mitigation therefore must include ISPs, not only large cloud platforms.
Deep dive: the guide’s operational controls and how to implement them
The guide intentionally focuses on operational controls ISPs and network defenders can adopt without major policy changes. Below we translate those recommendations into practical, prioritized actions for implementation.Curate malicious resource lists — how and where to start
- Aggregate multiple threat intelligence sources: commercial CTI feeds, open‑source blocklists, national CERTs, and peer sharing arrangements.
- Normalize detection artifacts to a consistent format (IP, ASN, domain, certificate fingerprint).
- Apply reputation scoring and tiered action: high‑confidence indicators → automatic block; lower confidence → monitor & alert.
Implement filters with minimal collateral damage
- Push controls to the network edge or upstream scrubbing points to discard malicious flows before they consume core capacity.
- Use graduated policies (rate‑limit, challenge, then block) instead of hard block rules for borderline indicators.
- Use proof‑of‑work or progressive challenge mechanisms for application‑layer abuse rather than immediate CAPTCHA to reduce user friction.
Analyze traffic and maintain telemetry
- Instrument for both bandwidth (Gbps/Tbps) and packet‑rate (pps) anomalies — modern attacks target packet‑processing capacity as much as raw throughput.
- Maintain per‑subscriber and per‑prefix metrics to enable rapid quarantine and targeted throttling.
- Retain logs long enough to support takedown requests and law‑enforcement investigations (subject to legal constraints).
Logging, ASN tracking, and escalation pathways
- Record ASNs and origin IPs associated with suspicious flows and correlate them with historical abuse patterns.
- Maintain standardized escalation templates (who to contact at upstream providers, CERTs, or law enforcement) and an evidence bundle format that includes meta‑telemetry, flow captures, and timestamps.
- Consider automated takedown or upstream suppression requests when persistent malicious infrastructure is traced to specific ASNs.
Threat intelligence sharing — practical modes
- Join or create ISACs, regional CERT sharing groups, and automated exchange channels (STIX/TAXII).
- Share anonymized indicators where legal/privacy constraints prevent full data exchange.
- Work with cloud providers to exchange telemetry that helps map malicious campaigns across service boundaries.
Additional recommendations for ISPs: operational and commercial actions
CISA’s guide makes ISP‑specific suggestions that range from technical to policy:- Customer notification and opt‑out: Notify customers before applying filters that could affect service, and provide opt‑out or appeal mechanisms to reduce churn or regulatory exposure.
- Premade filter packages: Offer customers curated filter sets they can apply in their own networks — a managed security offering that also reduces the provider’s monitoring burden.
- Codes of conduct and vetting: Collaborate with peer ISPs to set abuse‑prevention standards and require stronger Know‑Your‑Customer (KYC) practices for hosting and colocation customers.
Strengths of the guide
- Operational realism: The guide avoids sweeping legal recommendations in favor of immediately actionable technical controls that ISPs and network defenders can implement quickly.
- Balanced risk approach: It recognizes the risk of collateral harm and suggests staged measures, opt‑outs, and verification steps rather than blunt blocks.
- Multi‑stakeholder framing: By co‑sealing the guidance with international partners and law‑enforcement‑adjacent agencies, the message reaches a broader operational audience and supports cross‑border cooperation.
Limitations and risks — what defenders must watch for
- False positives and legitimate traffic disruption — Aggressive ASN/IP blocking can disrupt content delivery networks and legitimate cloud providers. Test and stage filters, and use graduated actions to reduce business impact.
- Attribution and measurement challenges — Short, bursty attacks and fast‑flux resolution complicate attribution; metrics like “peak Tbps” are sensitive to vantage point. Treat headline numbers with caution unless raw telemetry is available.
- Privacy and legal constraints — Collecting and storing subscriber data for vetting conflicts with local privacy laws in many jurisdictions. ISPs should consult counsel and maintain transparency when policy changes affect customer privacy.
- Operational capacity — Smaller ISPs may lack telemetry, automation, or scrubbing capacity; expecting uniform adoption without support mechanisms may leave gaps. Offer peer support, managed services, or graduated compliance timelines.
- Economics of evasion — As defenders harden BPH, criminals adapt: residential proxies, brand‑spoofed cloud traffic, and anonymized payment chains make simple blocks less effective. Continuous intelligence and policy levers (sanctions, local enforcement) remain necessary complements to technical controls.
Rapid implementation checklist for ISPs and network defenders
The guide’s recommendations are designed to be implemented across short horizons; this checklist synthesizes best practices into prioritized actions.Immediate (0–7 days)
- Confirm DDoS/edge protection is enabled for all public IPs and CDN endpoints.
- Subscribe to at least two reputable threat‑intelligence feeds and integrate them into monitoring.
- Turn on logging for ASN and IP origin, and set alerts for sudden pps/bps anomalies.
- Implement staged filtering: monitor → challenge/redirect → rate‑limit → block.
- Offer premade filters for customers and publish clear notification/appeal procedures.
- Run tabletop exercises with vendors, upstream ISPs, and law enforcement escalation points.
- Deploy per‑subscriber egress policing and automated quarantine workflows for infected CPE.
- Participate in regional intelligence sharing and bulk indicator exchange (STIX/TAXII).
- Establish KYC procedures and contract language requiring cooperation on abuse remediation for hosting customers.
Policy context and international enforcement
Technical mitigation alone will not eliminate BPH. Recent law‑enforcement moves and sanctions show a multi‑pronged approach is already in play: takedowns of BPH infrastructure in Europe and OFAC sanctions against service providers have degraded some criminal hosting options, but new BPH offerings reappear in permissive jurisdictions or via rebranded entities. Coordinated policy responses — sanctions, targeted enforcement, and minimum security requirements for hosting registrars and edge device manufacturers — will be necessary to raise the floor for safe Internet operation. The guide positions technical controls as complementary to these measures.Practical case study: upstream suppression vs. origin blocking
A common question is whether to block a hostile origin immediately or to suppress it upstream. The guide and industry practice recommend upstream suppression (drop malicious flows at the provider backbone or at peering edges) where possible, because it reduces the risk of overblocking shared cloud addresses and preserves last‑mile connectivity. When the malicious traffic can be traced to an ASN that persistently refuses to remediate, escalated actions — including coordinated peer filtering or working through law enforcement — are appropriate. Evidence from recent DDoS incidents shows upstream suppression combined with cloud scrubbing preserves availability for victims while isolating the hostile infrastructure.Final assessment — what defenders gain, and what to watch
CISA’s Bulletproof Defense is a useful, pragmatic toolkit that helps ISPs and network defenders translate strategic goals (reduce BPH effectiveness) into tactical actions (filters, telemetry, intelligence sharing). Its greatest value is operational: it reduces friction for defenders by describing concrete implementations and emphasizing staged, measured responses that limit collateral harm.That said, the guide is not a silver bullet. Technical controls can force criminals to more costly hosting models, but they cannot by themselves eliminate the incentives that sustain BPH markets. Success requires:
- Continued investment in telemetry and automation across ISPs and cloud providers.
- Legal and policy levers to make persistent non‑cooperation by BPH economically risky.
- Device and supply‑chain changes that reduce the pool of vulnerable endpoints used as proxies or botnet nodes.
Bottom line for Windows admins, ISPs, and network defenders
- Prioritize telemetry: monitor both packet‑rate and throughput; enable alerts on deviations.
- Translate intelligence into staged enforcement: test blocklists, use challenges and rate‑limits, then block when confidence is high.
- Coordinate: share indicators with peers, engage upstream ISPs for suppression, and document escalation paths for law enforcement.
Source: CISA CISA Releases Guide to Mitigate Risks from Bulletproof Hosting Providers | CISA