GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers

This joint guidance outlines how cybercriminals increasingly rely on bulletproof hosting providers—services that ignore abuse complaints and legal requests—to power ransomware, phishing, malware delivery, and other malicious activity. It explains how these providers blend into legitimate internet infrastructure, making them difficult to detect and disrupt. The document encourages ISPs and network defenders to build “high-confidence” threat lists, apply smarter filtering, and share intelligence to help shrink the operational space these actors depend on. By adopting coordinated mitigation steps, organizations can reduce cybercriminals’ ability to hide behind these resilient hosting networks.

  • Author(s):
  • Cybersecurity and Infrastructure Security Agency
  • National Security Agency
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:Cybersecurity and Infrastructure Security Agency (CISA)
Published:November 19, 2025
License:Public Domain

Featured Content

Contact Publisher

Claim Content

Stay Ahead of Government Policy Changes

Get exclusive access to the latest white papers, executive orders, and policy updates delivered to your inbox. Join 120K+ government professionals who rely on GovWhitePapers for critical intelligence.