Security News > 2020 > July > How do cybercriminals secure cybercrime?

How do cybercriminals secure cybercrime?
2020-07-23 05:00

Trend Micro unveiled new insights analyzing the market for underground hosting services and detailing how and where cybercriminals rent the infrastructure that hosts their business.

There are varied types of underground hosting and associated services used by cybercriminals to operate their businesses, including bulletproof hosting, VPNs, anonymizers, and DDoS protection.

"For over a decade, Trend Micro Research has dug into how cybercriminals think, as opposed to focusing only on what they do, which is critical when it comes to protecting against them," said Robert McArdle, director of forward-looking threat research at Trend Micro.

Some hosting providers have a legitimate clientele and advertise openly on the internet but may have resellers that sell exclusively to the criminal underground - either with or without the company's knowledge.

In the case of bulletproof hosters, which are more definitively linked to cybercrime, they are generally regular hosting providers trying to diversify their business to cater to the needs of specific customers.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/4rBWVa0SW9U/