Like all other internet abuse, bulletproof hosting does not just happen - it is enabled by facilitators such as network carriers, datacenter operators, IP brokers and domain registrars. Sometimes, malicious infrastructure agglomerates in the internet vicinity of such facilitators - why not join the show if your criminal competitors thrive there already?π§
A particularly prolific example is π©πͺaurologic GmbH (regular readers might recognize the name), as highlighted by Recorded Future in a report published on November 6 ‡οΈ
#Cybercrime #BulletproofHosting #ThreatIntel #HostingProviders

Malicious Infrastructure Finds Stability with aurologic GmbH
This investigative report reveals how German hosting provider aurologic GmbH has become a central enabler of malicious internet infrastructure, lin...




