How Do ISPs Fight Internet Abuse and What Can We Learn

Spam is the most frequently encountered type of internet abuse, with malware, botnet attacks, and phishing following suite. Specific know-how, hiring a dedicated cybersecurity specialist, or the use of threat intelligence company services minimizes the risks of internet abuse.

The list of most common internet abuse includes spam, botnet infection, phishing, copyright infringement, and hack attacks, among others.

Although the threats differ in nature and damage, they can possibly inflict, knowing how to prevent them from happening could potentially save considerable sums of money for both individual users and businesses. At the forefront of combating internet abuse are the internet infrastructure providers, having collected extensive knowledge on fighting malpractices on the net.

Vincentas Grinius, CEO of Heficed, an IP address, cloud, and dedicated server provider, commented on the types of internet abuse cases that the company encounters most often, and made suggestions on how to prevent them.

“Spam is the most common type of IP address abuse we encounter,“ said Grinius. „For instance, if our infrastructure is used inappropriately, our own abuse reporting tools seem to work rather efficiently as we have an active user base. That said, we use several anti-abuse tools to monitor the kinds of activities being performed within our address pool. A less common abuse type is malware and botnet attacks when the IP addresses are being used for coordinated attacks on networks. Finally, other types of malpractice, like phishing, are less encountered yet also dangerous for both the users and the reputation of the IP address providers.”

The reputation Grinius mentioned is of extreme importance for every company leasing IP addresses. Since there is a limited supply of IPv4 addresses left in the official pools of RIRs (Regional Internet Registries), companies now turn to IP address vendors to lease or buy IP addresses they need. If an IP address provider allows their IPs to be used for malpractices, it risks damaging the reliability of their address pool, potentially causing irreparable reputational damage.

“As an IP address provider, our business is directly dependent on the reputation of our IP address resources,” added Grinius. “By working closely with organizations like Spamhaus and applying a number of abuse-prevention processes, we constantly monitor for any illicit activity that might be carried out with the IP addresses we lease. A single abused IP address could make the whole block of addresses it belongs to unusable, therefore it is paramount to ensure only legal practices of using IP addresses are applied by our customers.”

Even though not every business owner or an individual internet user can have an in-depth understanding of available internet abuse threats, some steps should be taken to minimize the cybersecurity risks.

“Both businesses and individuals should have the basic knowledge of how to avoid becoming a victim of IP address abuse,“ finished Grinius. „Apart from staying informed by reading technical know-how on the subjects, as not everyone has the needed time or technical background to understand the topics, there is a growing number of threat intelligence and online protection companies that specialize in preventing online threats from damaging users. For companies to be reassured of their internet security, hiring a dedicated online security officer should be considered.”

About Heficed

Headquartered in London, Heficed provides full-range services for IP lease, monetization, and management services. Heficed serves around 60 multi-billion industries starting from hosting to automotive or healthcare. With the millions of IP addresses and 12 years of industry experience and the operations globally, Heficed can meet any demand needs. That includes automated provisioning bare-metal solutions and cloud services in 9 locations around the world.

We use cookies to provide our services and for analytics and marketing. To find out more about our use of cookies, please see our Cookies Policy. By continuing to browse our website, you agree to our use of cookies.