Home

The Anatomy of a Bulletproof Hoster: A Data-Driven Reconstruction of Media Land

This post reconstructs how sanctioned Bulletproof Hoster Media Land’s internal platform organised users, subscriptions, and address space, based on a leaked dataset. By linking lifecycle records to known Black Basta indicators, it highlights how customer segments and reseller-like entities provisioned infrastructure later used in ransomware acti...

Read more

The Ransomware Blame Game: Who Bears the Burden of Sanction Enforcement?

When I worked in a Computer Emergency Response Team (CERT), ransomware cases were part of the routine. A company would be hit, backups failed, and the question of ransom payment would come up. Every so often, the team would offer the option of a sanction checking service to verify whether payment was even legal. However, these sanction checks wo...

Read more