Overview
Syllabus
Intro
Cyber Threat Landscape
Categories of Hosting Providers
Threat Intelligence Cycle
Threat Intel Ecosystem Focus Areas
Requirements
Our stakeholders
Collection
Umbrella Investigate Intel Production Cycle
Processing
Autonomous System Number (ASN)
Analysis
Leaf (Stub) ASN or leaf ASNs chain
Indicator: Offshore Business Registration
Anonymous Payment Methods
Helping customers to maintain operations
Sample Rogue Hosters with a Dutch footprint (April 2018)
Dissemination
Law enforcement: Cross Jurisdictional Business Model
Law enforcement: Taking Down Bad Content
Law Enforcement Recommendations
Security Community Recommendations
Policy makers: Recommendations
Hosting Community Recommendations
Summary
References
Additional Related Work
Taught by
Hack In The Box Security Conference