Monday, December 22, 2014
Text Size


Bulletproof Cybercrime Hosting & the Cloud

HostExploit is pleased to present the next report in the Top 50 Bad Hosts & Networks series, for the period of 2011 Q3. For the second consecutive quarter, the report is published in collaboration with Russian security company Group-IB. Both English and Russian versions of the report are available to download now:

Blog Image

Download the English report (PDF) here.

Download the Russian report (PDF) here.

Download the Russian report (PDF) here from Group-IB.

This year has been characterized by frequent reports of hacks and data breaches with little change in Q3 2011 in a seemingly never ending outflow of data from organizations struggling to cope with the demands of ever changing technologies.

Social engineering is now acknowledged as a leading threat to organizations and businesses of all sizes with many lacking the resources to control this multi-faceted problem. The rise of personal gadgets used within the workplace brings its own set of problems too. Key to countering cybercrime in its many forms and guises is to raise awareness and to educate users/employees/IT personnel about current threats and the places that they are likely to come from.


UK Riots and the Internet: How They Destroyed Lives

Blog Image

Recently in the UK, close to my home, there have been riots. Hearing stories of children, adults and, of course, 'youths', murdering, mugging and looting has been a scary experience. Some people blame the parenting of the generation, perhaps the news uncovers a different story as the riots involved not just youths, but a thirty-one year old teacher, eleven year olds, men, women, children and people of all races. One common factor was the technology that provided the means to communicate and without doubt helped the riots to gather momentum.

Nearly half of all UK teenagers now have a smartphone according to Ofcom. In March 2011, Ofcom found BlackBerry to be the most popular choice (37%) for young adults and teens. This also represents the largest age group of the rioters and many reports have linked the use of BlackBerrys to the spreading of messages about the riots.

Young people like the BlackBerry Messaging services (BBM) because it is free to use, can be used as often as liked and messages can be sent to as many people as wanted in a short space of time. Before the riots, BlackBerry BBM was untraceable – this made it easy to communicate information about the location and timing of planned riots.

Seeing this as a violation of its service, BlackBerry may now have to change some of its terms so that messages can be traced by the authorities. Although technology isn't to blame for these acts, it has been used as a tool to help criminals organise their crimes.

Somewhat controversially, two men have received four years imprisonment each for inciting looting and rioting by the use of social networking sites. They invited friends and family to meet "behind maccies" to go looting and rioting. Meanwhile, rioters are not the only ones using the Internet as a means to an end. The Police have been using Twitter to name and shame rioters and looters, spreading photos on Facebook and other social networking sites in the belief that everyone is connected to everyone else through six steps, a sort of six degrees of separation technique. Some people think this is morally wrong, but perhaps naming and shaming is the best thing for the current situation. If the people involved in the situation are made an example of they are less likely to repeat the same behaviour and they are less likely to be copied.

Technology has also been used to try to save some of the communities that were in danger of being destroyed by the riots. Local people to the riots, came out and cleared up the mess in the true spirit of community action. There are countless Facebook pages and events with thousands of people taking part in "Operation Cup of Tea", an attempt to rescue what they see as lost communities. This shows the internet can be used also to support and help all of those who have lost something, whether its faith in the human race or their home.

These types of actions are signs that the Internet can be used for good. Other similar examples can be found around the world for instance WikiCrimes, a website for the anonymous reporting of crimes that maps hotspots and raises awareness about pockets of crime. WikiCrimes is big in Brazil with other South American countries following this lead.

The Internet is a powerful tool and I hope the actions of a few will not lead to the disadvantage of the majority.

If you find yourself under any form of peer pressure on the internet, to take part in any type of activity, you can find help and advice on a number of websites. Here are a few suggestions:

The UK Police has a helpful site with information about reporting local crime and links to helpful advice on a number of subjects.

Welcome to our feature: "A Teen Talks Cyber Security".

Faye Shippam

We are pleased to welcome a new guest blogger, Faye Shippam. As a victim of cyberbullying Faye has turned her attention to helping others in a similar position and will be posting her views as well as providing help and advice on the subject of cyber security.

Faye is a student, edits her college magazine and wants to spread the message about staying safe online further afield. She is also into marine biology, likes running and is a self-confessed 'utter' animal lover. So enjoy Faye's blogs here...


Hacking, Bad Hosting & False Positives

Blog Image

The Q2 Top 50 Bad Hosts & Networks report encompasses analysis on all 38,030 currently advertised and commercial hosts (ASNs), focusing on the 50 worst offenders. HostExploit is pleased to announce that for the first time, and in collaboration with Group iB, the report is published in English and Russian with both versions available as free downloads. In addition, registration is no longer required to view the public reports.

Download the English report (PDF) here.

Download the Russian report (PDF) here.

Download the Russian report (PDF) here from Group iB.

In a quarter dominated by press stories from self-publicizing hackers such as Anonymous and LulzSec, matched with DDoS attacks and data exfiltration by others, it is easy to overlook the more widespread problems – as an example, there were around 350,000 website defacement hacks in this quarter and 1.5 million in 2010. Additionally, there are currently 800,000 plus web sites hosting malicious exploits and badware.


Current Cyber Security Events and the World’s Worst Hosts

Blog Image

HostExploit is pleased to present the Q1 2011 report on the Top 50 Bad Hosts and Networks, taking a look at recent notable events such as the LizaMoon SQL attacks and the takedown of the Rustock botnet.

Download the two page summary (PDF) here and the full report (PDF) here.

In addition to HostExploit’s regular quarterly analysis of the world’s worst hosts for malicious activity – including spam, botnets, badware, phishing attacks and infections – the report looks at the fallout of major hacks and intrusions in the industry and what it means for the hosts themselves. Other pertinent topics such as Advanced Persistent Threats (APT), mobile malware and 32-bit ASNs are discussed.


The Naivety of a Young Girl on the Internet

Blog Image

Last July the story of Jessi ‘Slaughter’ became one of the hottest subjects on social networking and video sharing websites, but for many of the wrong reasons. With Safer Internet Day just recently, this event serves as an excellent example to children (and others!) of how not to behave online. I decided to take a closer look at the Jessi Slaughter incident.

It’s not that easy to get to grips with all the facts around the story which is surrounded by confusion and rumors. For me, that is lesson number one. Things can so easily become distorted on the ‘net’ especially when many people get involved giving their own views and comments. What is clear though is that letting a child loose on the Internet can lead to all sorts of dangers as this 11-year-old girl found out. The Internet can make you famous but it can also make you a victim. It can ruin not only your life but of those around you, your family and your friends.


Page 2 of 7

Latest Blogs

  • 1
  • 2
  • 3


Sign up to the HostExploit newsletter to receive the latest news on HostExploit reports and other developments.