Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework



Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework

Cyber agencies call on ISPs to help combat "bulletproof" internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections.

Key takeaways

  1. Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network defenders to help degrade internet infrastructure used by cybercriminals.
     
  2. New agentic AI risk framework: The Cloud Security Alliance introduced the Capabilities-Based Risk Assessment (CBRA) to help organizations quantify risks associated with autonomous AI systems.
     
  3. Fresh CIS Benchmarks: A new batch of configuration guides covers Windows Server 2025 and various Linux distros, alongside updates for software products from Google, IBM, Oracle and others.

Here are five things you need to know for the week ending November 21.

1 - Cyber agencies ask for help in defusing “bulletproof” internet hosts used by criminals

Multi-national cybersecurity agencies are asking ISPs and network defenders to help unmask and dismantle bulletproof hosting providers (BPH), which offer internet infrastructure services to cyber criminals.

“The authoring agencies have observed a marked increase in cybercriminal actors using BPH infrastructure to support cyber operations against critical infrastructure, financial institutions, and other high-value targets,” reads the joint advisory “Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers.”

“BPH providers continue to pose a significant risk to the resilience and safety of critical systems and services,” adds the advisory from cyber agencies in Australia, Canada, the Netherlands, New Zealand, the U.K., and the U.S.

BPHs intentionally ignore legal processes, abuse complaints, and law enforcement takedown requests, shielding cybercriminals and helping them launch ransomware attacks, extort data, deliver malware, conduct phishing campaigns, and more.

They provide obfuscation through techniques like fast flux, effectively masking the identity and location of the perpetrators.
 

Cover page of CISA advisory “Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers”


However, identifying criminal activity facilitated by BPHs isn’t easy because BPH infrastructure is woven into the infrastructure of legitimate ISPs.

“BPH providers lease their own infrastructure to cybercriminals. Increasingly, they resell stolen or leased infrastructure from legitimate hosting providers, data centers, ISPs, or cloud service providers who may unknowingly enable BPH providers to provide infrastructure to cybercriminals,” reads the document.

The advisory offers guidance for ISPs and network defenders to take “nuanced” steps to gum up BPHs’ services without impacting legitimate infrastructure.

Ultimately, the idea is to help degrade the effectiveness of BPHs’ infrastructure to the point where their cyber criminal customers are forced to leave their BPH safe havens and switch to legitimate service providers, which, unlike BPHs, do respond to abuse complaints and to law-enforcement requests. 

Recommendations include:

  • Conducting rigorous traffic analysis
  • Curating and automating reviews of "high confidence" lists of malicious internet resources
  • Establishing robust standards for ISP accountability
  • Proactively creating filtering tools
  • Maintaining transparent communication regarding malicious resource lists

Bulletproof hosting is one of the core enablers of modern cybercrime,” Acting CISA Director Madhu Gottumukkala said in a statement. “By shining a light on these illicit infrastructures and giving defenders concrete actions, we are making it harder for criminals to hide and easier for our partners to protect the systems Americans rely on every day.”

In a related development, Australia, the U.K. and the U.S. jointly sanctioned Russia-based BPH company Media Land and its network, the U.S. Treasury Department said in a statement. Meanwhile the U.K. and U.S. governments also sanctioned Hypercore Ltd., a front company for BPH company Aeza Group, along with several individuals, it added.

For more information about BPH:

2 - CSA unveils agentic AI risk assessment tool

To assess the risks of using agentic AI, conventional risk models may fall short. So how can you determine the risks your organization faces from these autonomous AI tools?

You might want to check out a new risk-assessment framework for agentic AI systems from the Cloud Security Alliance (CSA).

The framework, called Capabilities-Based Risk Assessment (CBRA) is detailed in a new CSA white paper and evaluates agentic AI systems across four areas: 

  • System criticality
  • AI autonomy
  • Access permissions
  • Impact radius

These factors are combined to generate a composite risk score, allowing enterprises to quantify the potential consequences of system failure or misuse.
 

Cover page of  CSA's "Capabilities-Based Risk Assessment (CBRA) for AI Systems" report


“AI autonomy and access are expanding faster than traditional risk management models can adapt,” Pete Chronis, Co-Chair of the CSA AI Safety Initiative CISO Council, said in a statement. 

“CBRA allows enterprises to align their governance investments with actual risk exposure – protecting high-impact agentic systems while accelerating safe innovation elsewhere,” he added.

The CBRA is integrated with the CSA’s AI Controls Matrix (AICM). CBRA maps its three-tier risk levels — low, medium, and high — to the AICM’s library of over 240 AI-specific controls, so that security measures taken are proportionate to the risk.

For more information about AI security, check out these Tenable Research blogs:

3 - CIS releases batch of new and updated Benchmarks

Time to tighten the screws on the software configurations of products from Oracle, Microsoft, Google, IBM, Apple, and more. The Center for Internet Security (CIS) just refreshed a variety of its existing Benchmarks and introduced multiple new ones.

The following CIS Benchmarks were updated:

CIS also launched seven entirely new Benchmarks. The CIS Microsoft Windows Server 2025 Stand-alone Benchmark v1.0.0 provides foundational security guidance for the latest Windows server environment. Linux coverage was expanded with new Benchmarks for Red Hat Enterprise Linux 10, Rocky Linux 10 and AlmaLinux OS 10. Additionally, new guides were released for IBM z/OS with RACF, FortiGate 7.4.x, and Apple iOS/iPadOS 18 for Intune, the latter specifically tailored for device management via Microsoft Intune.

Meanwhile, there are new Build Kits for various Oracle, Microsoft and Red Hat products. Build Kits automate the CIS Benchmarks’ configuration process.

CIS Benchmarks logo


Currently, CIS has 100-plus Benchmarks to harden the configurations of cloud platforms; databases; desktop and server software; mobile devices; operating systems; and more.

To get more details, read the CIS blog “CIS Benchmarks Monthly Update November 2025.” For more information about the CIS Benchmarks list, check out its home page and FAQ, as well as:

4 - CISA: Drone-detection tools have their own cyber risks

As critical infrastructure organizations rush to buy drone-detection systems to protect themselves from malicious drones, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is raising a red flag: the detection tools themselves can be vulnerable.

In a guide published this week to help critical infrastructure organizations choose these tools, CISA warned that an important aspect of the selection process is the cybersecurity posture of these unmanned aircraft systems (UAS), as drones are formally known.

“Cybersecurity vulnerabilities can compromise the confidentiality, integrity, and availability of UAS detection information,” reads the guide “Unmanned Aircraft System Detection Technology Guidance.”
 

CISA logo


Examples of cybersecurity flaws in these UAS-detection products include:

  • Insecure collection and transfer of data
  • Malicious executables hidden within required software and firmware updates
  • Vulnerable connected devices utilized by detection systems

CISA recommends that critical infrastructure organizations ask UAS-detection vendors questions including:

  • Can your product’s operating system be physically accessed or tampered with?
  • Can you provide both a software bill of materials (SBOM) and hardware bill of materials (HBOM) for your product?
  • How long will you provide security and firmware updates for your product?
  • What data does your product’s sensor collect and store?
  • Who will have access to the data collected by your product?

“The new risks and challenges from UAS activity demonstrate that the threat environment is always changing, which means our defenses must improve as well,” CISA Acting Director Madhu Gottumukkala said in a statement.

The 12-page guide also addresses non-cyber criteria for choosing a drone-detection system.

CISA published two other drone-security guides in July for critical infrastructure organizations: “Suspicious Unmanned Aircraft System Activity Guidance for Critical Infrastructure Owners and Operators” and “Safe Handling Considerations for Downed Unmanned Aircraft Systems.” 

5 - Malware infections jump almost 40% in Q3

Malware infection reports spiked 38% from the second to the third quarter of 2025, according to data from CIS’ Multi-State Information Sharing and Analysis Center (MS-ISAC) monitoring services.

SocGholish, which attackers use in fake software-update attacks, once again ranked as the most prevalent malware variant, a spot it has held for the past two years.

SocGholish’s prevalence reflects the popularity of fake software-update attacks among hackers. These attacks attempt to trick unsuspecting users into downloading a software update that appears legit. Of course, the “update” infects victims’ devices with malware.

Following SocGholish is CoinMiner, a cryptocurrency miner that spreads via Windows Management Instrumentation (WMI), and Agent Tesla, a remote access trojan (RAT) known for harvesting credentials and capturing keystrokes.

Notably, Q3 2025 saw the return of the Gh0st, Lumma Stealer, and TeleGrab variants, and the debut of Jinupd. 

According to CIS, Lumma Stealer’s reappearance is significant as it follows a previous law enforcement takedown of its "malware as a service" (MaaS) infrastructure for targeting banking data and personal information. 

Jinupd, the newcomer, is a point-of-sale (POS) infostealer that scrapes credit card data from memory, often disguising itself as a Java updater.

The report tracks three primary infection vectors: Dropped (delivered by other malware), Malspam (malicious emails), and Malvertisement (malicious ads). However, "Multiple" was the leading infection vector category for this quarter.
 

Pie chart from CIS with Q3 2025's top malware variants


Here’s Q3’s malware hit parade:

  • SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates
  • CoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)
  • Agent Tesla, a RAT that captures credentials, keystrokes and screenshots
  • TeleGrab, an infostealer that targets Telegram, swiping cache and key files, hijacking chat sessions, and stealing contacts and chat history
  • ZPHP, a RAT that captures credentials, keystrokes and screenshots
  • VenomRAT, an open-source malware whose features include keylogging, data exfiltration and screen capturing
  • Gh0st, a RAT designed to control infected endpoint devices
  • NanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheet
  • Lumma Stealer, an infostealer used to swipe personal information, credentials, cookies and banking information
  • Jinupd, a point-of-sales infostealer that steals credit card information by scraping memory from payment-processing applications

To get more information, check out the CIS blog “Top 10 Malware Q3 2025,” where you’ll find more details, context and indicators of compromise for each malware strain.

For details on fake software-update attacks:


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

× Contact our sales team