Like all other internet abuse, bulletproof hosting does not just happen - it is enabled by facilitators such as network carriers, datacenter operators, IP brokers and domain registrars. Sometimes, malicious infrastructure agglomerates in the internet vicinity of such facilitators - why not join the show if your criminal competitors thrive there already?🧐
A particularly prolific example is 🇩🇪aurologic GmbH (regular readers might recognize the name), as highlighted by Recorded Future in a report published on November 6 ⤵️
https://www.recordedfuture.com/research/malicious-infrastructure-finds-stability-with-aurologic-gmbh
#Cybercrime #BulletproofHosting #ThreatIntel #HostingProviders








