{"id":55626,"date":"2024-03-19T16:52:54","date_gmt":"2024-03-19T16:52:54","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35673\/How-Rogue-ISPs-Tamper-With-Geofeeds.html"},"modified":"2024-03-19T16:52:54","modified_gmt":"2024-03-19T16:52:54","slug":"how-rogue-isps-tamper-with-geofeeds","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/","title":{"rendered":"How Rogue ISPs Tamper With Geofeeds"},"content":{"rendered":"<div>\n<div class=\"hu hv hw hx hy\">\n<div class=\"speechify-ignore ab co\">\n<div class=\"speechify-ignore bg l\">\n<div class=\"hz ia ib ic id ab\">\n<div>\n<div class=\"ab ie\"><a rel=\"noopener follow\" href=\"https:\/\/medium.com\/@DCSO_CyTec?source=post_page-----4dbc38db4123--------------------------------\"><\/p>\n<div>\n<div class=\"bl\" aria-hidden=\"false\">\n<div class=\"l if ig bx ih ii\">\n<div class=\"l fi\"><img decoding=\"async\" alt=\"DCSO CyTec Blog\" class=\"l fc bx dc dd cw\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:88:88\/1*LQUpYFsLUopYafQLEFNVTA.png\" width=\"44\" height=\"44\" loading=\"lazy\" data-testid=\"authorPhoto\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/a><\/div>\n<\/div>\n<div class=\"bm bg l\">\n<div class=\"l iw\"><span class=\"be b bf z dt\"><\/p>\n<div class=\"ab cm ix iy iz\"><span class=\"be b bf z dt\"><\/p>\n<div class=\"ab ae\"><span data-testid=\"storyReadTime\">11 min read<\/span><\/p>\n<p><span class=\"l\" aria-hidden=\"true\"><span class=\"be b bf z dt\">\u00b7<\/span><\/span><\/p>\n<p>2 hours ago<\/p><\/div>\n<p><\/span><\/div>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p id=\"4b6c\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Precise geolocation information for IP addresses has emerged from a niche requirement to a ubiquitous demand. While the country an IP address is (allegedly) related to has long been used for applications such as network traffic distribution and coarse geoblocking, today, state-, city- and sometimes even district-level geolocation information is crucial for modern security measures, such as fraud detection. Data brokers, advertisers, defenders, and investigators alike are interested in having precise and up-to-date information on the <em class=\"nh\">physical<\/em> location of an IP address at their disposal. The demand for such information has nurtured an entire industry, with US-based vendor <a class=\"af ni\" href=\"https:\/\/www.maxmind.com\/en\/home\" rel=\"noopener ugc nofollow\" target=\"_blank\">MaxMind<\/a> probably being the most commonly referred to source for geolocation information.<\/p>\n<figure class=\"nm nn no np nq nr nj nk paragraph-image\">\n<div role=\"button\" tabindex=\"0\" class=\"ns nt fi nu bg nv\">\n<div class=\"nj nk nl\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/0*t1ZE6vdv7VL7VS4j 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/0*t1ZE6vdv7VL7VS4j 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/0*t1ZE6vdv7VL7VS4j 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/0*t1ZE6vdv7VL7VS4j 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/0*t1ZE6vdv7VL7VS4j 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/0*t1ZE6vdv7VL7VS4j 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/0*t1ZE6vdv7VL7VS4j 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" type=\"image\/webp\"><source data-testid=\"og\" srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/0*t1ZE6vdv7VL7VS4j 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/0*t1ZE6vdv7VL7VS4j 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/0*t1ZE6vdv7VL7VS4j 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/0*t1ZE6vdv7VL7VS4j 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/0*t1ZE6vdv7VL7VS4j 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/0*t1ZE6vdv7VL7VS4j 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/0*t1ZE6vdv7VL7VS4j 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"><img alt class=\"bg lq nw c\" width=\"700\" height=\"467\" loading=\"eager\" role=\"presentation\"><\/picture><\/div>\n<\/div><figcaption class=\"nx fe ny nj nk nz oa be b bf z dt\">Photo by <a class=\"af ni\" href=\"https:\/\/unsplash.com\/@geojango_maps?utm_source=medium&amp;utm_medium=referral\" rel=\"noopener ugc nofollow\" target=\"_blank\">GeoJango Maps<\/a> on <a class=\"af ni\" href=\"https:\/\/unsplash.com\/?utm_source=medium&amp;utm_medium=referral\" rel=\"noopener ugc nofollow\" target=\"_blank\">Unsplash<\/a><\/figcaption><\/figure>\n<p id=\"a37e\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">However, a steady demand in geolocation information beyond a country-level has incentivized efforts to allow ISPs to propagate such information independently, perhaps further driven by MaxMind\u2019s <a class=\"af ni\" href=\"https:\/\/blog.maxmind.com\/2019\/12\/significant-changes-to-accessing-and-using-geolite2-databases\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">EULA changes for its free GeoLite2 databases in 2019<\/a>, which has caused problems <a class=\"af ni\" href=\"https:\/\/discuss.okfn.org\/t\/maxmind-closing-their-data-was-open-up-until-march-2018\/6545\" rel=\"noopener ugc nofollow\" target=\"_blank\">particularly<\/a> <a class=\"af ni\" href=\"https:\/\/www.ipfire.org\/blog\/a-new-location-database-for-the-internet\" rel=\"noopener ugc nofollow\" target=\"_blank\">among<\/a> the open-source community.<\/p>\n<p id=\"b4c4\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">A result of this development is IP Geolocation Feeds, commonly abbreviated as \u201cgeofeeds.\u201d By publishing these, ISPs can ensure that geolocation database vendors, among others, are more likely to learn about and subsequently return correct information for the IP networks under an ISP\u2019s control.<\/p>\n<p id=\"f2fc\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Unfortunately, threat actors are leveraging geofeeds as well, and have been observed publishing forged information, presumably with the objective of circumventing access control measures (such as country-level geoblocking) and hampering investigations. This blog post strives to shed light on a particularly noteworthy example, which also serves as a case study for discussing the viability of geofeeds as OSINT pivot points. Furthermore, countermeasures for defenders and investigators are suggested.<\/p>\n<p id=\"8280\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\"><em class=\"nh\">Blog post authored by <\/em><a class=\"af ni\" href=\"https:\/\/www.dcso.de\/en\/service\/threat-intelligence\/\" rel=\"noopener ugc nofollow\" target=\"_blank\"><em class=\"nh\">DCSO CSIRT\/Threat Research Team<\/em><\/a><em class=\"nh\">.<\/em><\/p>\n<h2 id=\"fe94\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">A Primer On Geofeeds<\/h2>\n<p id=\"7b7d\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">Specified in <a class=\"af ni\" href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8805\" rel=\"noopener ugc nofollow\" target=\"_blank\">RFC 8805<\/a>, IP Geolocation Feeds \u2014 commonly abbreviated as \u201cgeofeeds\u201d \u2014 allow ISPs to distribute information on the physical location of IP networks, consisting of country, region\/state, city, and ZIP code. Such information can then be parsed and (comparatively) easily included in geolocation databases for improved accuracy. A separate internet standard, <a class=\"af ni\" href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc9092\" rel=\"noopener ugc nofollow\" target=\"_blank\">RFC 9092<\/a>, discusses how to discover and verify geofeeds at scale in a structured fashion, such as in Regional Internet Registry (RIR) databases.<\/p>\n<p id=\"fb94\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">It is worth noting that RIR databases have long allowed the allocation of a country to IP network and Autonomous System (AS) objects, as the following example from the <a class=\"af ni\" href=\"https:\/\/www.ripe.net\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">RIPE<\/a> database shows:<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"7280\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 185.183.126.0 - 185.183.126.255<br>netname: Infrastructure<br>country: DE<br>admin-c: DCSO-RIPE<br>tech-c: DCSO-RIPE<br>status: LIR-PARTITIONED PA<br>mnt-by: DCSO-MNT<br>created: 2020-08-28T08:45:53Z<br>last-modified: 2020-08-28T08:45:53Z<br>source: RIPE<\/span><\/pre>\n<p id=\"aae8\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">However, it may not always be clear whether the \u201ccountry\u201d database field refers to the country a network is <em class=\"nh\">physically<\/em> located in, or the <em class=\"nh\">jurisdiction<\/em> that applies to it. (Both are Germany in the above example.) Consequently, many geolocation database vendors who incorporate country-level information from RIR databases abstain from clarifying this aspect as well, which often causes geolocation database users to be overly confident in the understanding of database outputs.<\/p>\n<p id=\"fddd\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Aside from that, RIR database schemes commonly do not allow for the machine-digestible publication of more precise geolocation information, such as the involved state or city. Assessing these by examining routing information, network latency triangulation, and other technical measures is often, but not always, feasible and is considerably more resource-intensive than parsing geofeeds and alike databases. While advertising and tracking networks may be able to correlate IPs with precise geolocation information made available from end-user devices (i.e., through GPS sensors and WiFi network mapping), collecting such information is a rather privacy-invasive measure.<\/p>\n<p id=\"0c12\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">An arbitrary example of a geofeed reference in RIR databases may look like this (note the <a class=\"af ni\" href=\"https:\/\/labs.ripe.net\/author\/denis\/example-usage-of-ripe-database-geolocation-prototype\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">\u201cgeoloc\u201d field<\/a>, which \u2014 unrelated to geofeeds \u2014 contains geographic coordinates on the physical location of this IP network):<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"cf88\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 5.149.224.0 - 5.149.239.255<br>netname: DE-R-KOM-20120717<br>country: DE<br>geoloc: 49.014042 12.127519<br>geofeed: https:\/\/geofeed.r-kom.de\/geofeed.csv<br>org: ORG-RA3-RIPE<br>admin-c: RKOM-RIPE<br>tech-c: RKOM-RIPE<br>status: ALLOCATED PA<br>mnt-by: RKOM-MNT<br>mnt-by: RIPE-NCC-HM-MNT<br>created: 2019-12-20T12:47:47Z<br>last-modified: 2022-10-20T06:04:14Z<br>source: RIPE<\/span><\/pre>\n<p id=\"a375\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">The CSV file will then contain further information, such as in this case:<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"117a\" class=\"pd oc gt pa b bf pe pf l pg ph\">5.149.224.0\/20,DE,DE-BY,Regensburg,<\/span><\/pre>\n<p id=\"1d8a\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">This allows geolocation database vendors to easily locate 5.149.224.0\/20 in the city of Regensburg, Bavaria, Germany. At the time of writing, DCSO has no reason to question this particular geolocation information.<\/p>\n<h2 id=\"34e7\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">Eygelshoven, Edison, or Paris? \u2014 A Case Study<\/h2>\n<p id=\"c7a0\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">However, not all geofeed use-cases are this benign, as the case of AS203168 (allocated to \u201cConstant MOULIN\u201d) shows: at the time of writing, five out of six IPv4 prefixes announced by this AS contain geofeed information, such as:<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"a194\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 45.88.90.0 - 45.88.90.255<br>netname: CONSTANTMOULIN<br>descr: Constantmoulin<br>org: ORG-CM304-RIPE<br>country: FR<br>geofeed: https:\/\/raw.githubusercontent.com\/geofeeds\/geofeed\/main\/geofeed.csv<br>admin-c: ACRO54823-RIPE<br>tech-c: ACRO54823-RIPE<br>abuse-c: ACRO54823-RIPE<br>mnt-lower: personal-ip-mnt<br>mnt-routes: personal-ip-mnt<br>mnt-domains: personal-ip-mnt<br>status: ASSIGNED PA<br>mnt-by: MNT-NETERRA<br>created: 2024-02-09T14:35:37Z<br>last-modified: 2024-03-05T10:17:23Z<br>source: RIPE<\/span><\/pre>\n<p id=\"3002\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">This geofeed URL, at the time of writing, returns:<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"291e\" class=\"pd oc gt pa b bf pe pf l pg ph\">193.222.96.0\/24,NL,NL-LI,Eygelshoven,<br>87.120.84.0\/24,US,US-NJ,Edison,<br>45.128.96.0\/24,US,US-NJ,Edison,<br>45.88.90.0\/24,FR,FR-75,Paris,<br>194.48.251.0\/24,FR,FR-75,Paris,<\/span><\/pre>\n<p id=\"012e\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">This suggests that 45.88.90[.]0\/24 is physically located in or near Paris, France. Indeed, global routing information and network latency triangulation efforts carried out by DCSO corroborate this information.<\/p>\n<p id=\"381f\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">However, this assessment does not hold true for all entries of this geofeed, particularly not for 45.128.96[.]0\/24 and 87.120.84[.]0\/24, both allegedly located in or near Edison, New Jersey, USA. Firstly, it is noteworthy that the RIPE database objects for both networks list \u201cFR\u201d (France) as the country code (both output have been trimmed for brevity reasons):<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"ca61\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 45.128.96.0 - 45.128.96.255<br>netname: CONSTANTMOULIN<br>descr: Constantmoulin<br>geofeed: https:\/\/raw.githubusercontent.com\/geofeeds\/geofeed\/main\/geofeed.csv<br>country: FR<br>&lt;snip&gt;<\/span><\/pre>\n<pre class=\"pi oz pa pb bo pc ba bj\"><span id=\"2b21\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 87.120.84.0 - 87.120.84.255<br>netname: BG-NETERRAIP-20050712<br>country: FR<br>org: ORG-NL38-RIPE<br>admin-c: ACRO54823-RIPE<br>tech-c: ACRO54823-RIPE<br>abuse-c: ACRO54823-RIPE<br>status: ALLOCATED PA<br>geofeed: https:\/\/raw.githubusercontent.com\/geofeeds\/geofeed\/main\/geofeed.csv<br>&lt;snip&gt;<\/span><\/pre>\n<p id=\"71ca\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">However, as mentioned above, the \u201ccountry\u201d could also refer to the jurisdiction that applies to these networks\u2014which would prompt questions as well, given that the postal addresses provided for AS203168 in general and both networks in particular refer to Dinant, a Belgian province.<\/p>\n<p id=\"cbf3\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">At the time of writing, 45.128.96[.]0\/24 is routed via AS49581 (\u201cFerdinand Zink trading as Tube-Hosting,\u201d according to the RIPE database), an ISP <a class=\"af ni\" href=\"https:\/\/tube-hosting.com\/home\" rel=\"noopener ugc nofollow\" target=\"_blank\">offering<\/a> VPS, VDS, and colocation services in the <a class=\"af ni\" href=\"https:\/\/skylink-data-center.nl\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">SkyLink datacenter<\/a>, located in Eygelshoven, the Netherlands. DCSO was unable to discover any presence of this ISP in the USA; indeed, the following router appearing in traceroute outputs for this network corroborates the hypothesis of this \/24 being located in Eygelshoven. However, it is worth noting that \u201cEGH\u201d does not appear to be the <a class=\"af ni\" href=\"https:\/\/www.iata.org\/en\/publications\/directories\/code-search\" rel=\"noopener ugc nofollow\" target=\"_blank\">IATA<\/a> or <a class=\"af ni\" href=\"https:\/\/service.unece.org\/trade\/locode\/nl.htm\" rel=\"noopener ugc nofollow\" target=\"_blank\">UN\/LOCODE<\/a> code allocated to Eygelshoven (both IATA and UN\/LOCODE are frequently used for referring to physical locations).<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"aa07\" class=\"pd oc gt pa b bf pe pf l pg ph\">ae4.1129-1.cr1.egh.as49581.net (80.91.223.18)<\/span><\/pre>\n<p id=\"1f02\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">BGP routing information for this \/24 also contain SkyLink\u2019s AS (AS44592), further corroborating DCSO\u2019s aforementioned hypothesis that this network is neither physically located in France (according to its RIPE database record) nor in the USA (according to its geofeed):<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"2976\" class=\"pd oc gt pa b bf pe pf l pg ph\">45.128.96.0\/24 4608 7575 199524 44592 49581 203168 203168<\/span><\/pre>\n<p id=\"642a\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">As far as 87.120.84[.]0\/24 is concerned, it appears to be routed via AS399486 (12651980 CANADA INC.) at the time of writing. According to its <a class=\"af ni\" href=\"https:\/\/virtuo.host\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">website<\/a>, this ISP offers dedicated server and colocation offerings in data center facilities in Montreal, Canada, as well as Edison, USA. However, DCSO was unable to conclusively assess in which of these facilities 87.120.84[.]0\/24 is physically located, and it remains unclear why the network\u2019s RIPE database object lists France in its \u201ccountry\u201d attribute.<\/p>\n<p id=\"9d0e\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">It is worth mentioning that all prefixes announced by AS203168, as well as the Autonomous System itself, are listed in <a class=\"af ni\" href=\"https:\/\/www.spamhaus.org\/blocklists\/do-not-route-or-peer\" rel=\"noopener ugc nofollow\" target=\"_blank\">Spamhaus DROP lists<\/a> at the time of writing, suggesting a poor reputation of this ISP:<\/p>\n<blockquote class=\"pj pk pl\" readability=\"11\">\n<p id=\"afb2\" class=\"mj mk nh ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">The Spamhaus DROP lists consist of netblocks that are leased or stolen by professional spam or cyber-crime operations, and used for dissemination of malware, trojan downloaders, botnet controllers, or other kinds of malicious activity.<\/p>\n<\/blockquote>\n<p id=\"9e0b\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">DCSO was unable to discover a website publicly mentioning services hosted by AS203168, which leads to the suspicion that this ISP does not advertise and sell its services through public-facing websites. 194.33.191[.]0\/24, a prefix currently announced by this Autonomous System, was previously in use by AS211252, allocated to <a class=\"af ni\" href=\"https:\/\/opencorporates.com\/companies\/us_de\/5859744\" rel=\"noopener ugc nofollow\" target=\"_blank\">Delis LLC<\/a>, a now-defunct <a class=\"af ni\" href=\"https:\/\/ioc.exchange\/@abuse_ch\/110690118918669151\" rel=\"noopener ugc nofollow\" target=\"_blank\">bulletproof<\/a> <a class=\"af ni\" href=\"https:\/\/info.spamhaus.com\/hubfs\/Botnet%20Reports\/2022%20Q3%20Botnet%20Threat%20Update.pdf#page=16\" rel=\"noopener ugc nofollow\" target=\"_blank\">hoster<\/a> operating out of a data center owned by Dutch ISP Serverion BV.<\/p>\n<p id=\"d58c\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">According to <a class=\"af ni\" href=\"https:\/\/www.limburger.nl\/cnt\/dmf20230524_95579950\" rel=\"noopener ugc nofollow\" target=\"_blank\">news<\/a> <a class=\"af ni\" href=\"https:\/\/www.limburger.nl\/cnt\/dmf20230526_93435964\" rel=\"noopener ugc nofollow\" target=\"_blank\">reporting<\/a>, the aforementioned SkyLink data center has previously come under scrutiny by Dutch law enforcement authorities in conjunction with illegal IPTV streaming, culminating in a raid carried out by the Netherlands\u2019 fiscal intelligence unit (FIOD) on March 23, 2023.<\/p>\n<h2 id=\"ac0b\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">OSINT Pivot Potential of Geofeeds<\/h2>\n<p id=\"92a9\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">It is well understood that, from an OSINT perspective, any kind of database whose edit history can be publicly retrieved \u2014 which often is the case for RIR databases \u2014 has the potential of holding a wealth of information suitable for enabling or proliferating investigations.<\/p>\n<p id=\"e4e0\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">In the case of geofeeds, this may also apply to the content of the geofeed itself, particularly if it is provided via a source code repository. In the case of AS203168, combining both historical RIPE database information and metadata retrieved from the involved Git repositories unveils further information on entities associated with or controlling AS203168.<\/p>\n<p id=\"dae9\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">First, historical versions of RIPE database objects of the involved prefixes contain different geofeed URLs (output trimmed for brevity):<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"4d00\" class=\"pd oc gt pa b bf pe pf l pg ph\">inetnum: 45.88.90.0 - 45.88.90.255<br>netname: CONSTANTMOULIN<br>descr: Constantmoulin<br>org: ORG-CM304-RIPE<br>country: FR<br>geofeed: https:\/\/raw.githubusercontent.com\/pfcloud-io\/geofeed\/main\/geofeed.csv<br>&lt;snip&gt;<\/span><\/pre>\n<p id=\"f3ba\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">This suggests a certain degree of involvement by German <a class=\"af ni\" href=\"https:\/\/pfcloud.io\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">Pfcloud UG<\/a> in the operation of AS203168. On the same day when the RIPE database object for 45.88.90[.]0\/24 was last updated to include aforementioned, more unobtrusive geofeed URL (March 5, 2024), a variety of networks were deleted via <a class=\"af ni\" href=\"https:\/\/github.com\/pfcloud-io\/geofeed\/commit\/22722a610a1ecc6548cb0b539aca5c5d77fe9e72\" rel=\"noopener ugc nofollow\" target=\"_blank\">a Git commit<\/a> in the <a class=\"af ni\" href=\"https:\/\/github.com\/pfcloud-io\/geofeed\" rel=\"noopener ugc nofollow\" target=\"_blank\">geofeed GitHub repository<\/a> that Pfcloud maintains.<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\" readability=\"26.5\"><span id=\"69c6\" class=\"pd oc gt pa b bf pe pf l pg ph\" readability=\"47\">commit 22722a610a1ecc6548cb0b539aca5c5d77fe9e72 (HEAD -&gt; main, origin\/main, origin\/HEAD)<br>Author: TeamAggro (~Steve) &lt;49125036+TeamAggroDEV@users.noreply.github.com&gt;<br>Date: Tue Mar 5 09:56:26 2024 +0100<p>Update geofeed.csv<\/p><p>diff --git a\/geofeed.csv b\/geofeed.csv<br>index 7de625e..d6aaf67 100644<br>--- a\/geofeed.csv<br>+++ b\/geofeed.csv<br>@@ -8,10 +8,6 @@<br>147.78.102.0\/24,NL,NL-LI,Eygelshoven,<br>87.121.69.0\/24,GB,GB-LND,London,<br>87.121.58.0\/24,NL,NL-LI,Eygelshoven,<br>-193.222.96.0\/24,NL,NL-LI,Eygelshoven,<br>-87.120.84.0\/24,US,US-NJ,Edison,<br>-45.128.96.0\/24,US,US-NJ,Edison,<br>-45.88.90.0\/24,FR,FR-75,Paris,<br>2a05:b0c6:a000::\/39,US,US-AZ,Phoenix,<br>2a05:b0c6:a200::\/39,DE,DE-BE,Berlin,<br>2a05:b0c6:a400::\/39,GB,GB-LND,London,<\/p><\/span><\/pre>\n<p id=\"de0b\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">A <a class=\"af ni\" href=\"https:\/\/github.com\/geofeeds\/geofeed\/commit\/358614d3c919471d8bba6ce31f9f9583bda3adba\" rel=\"noopener ugc nofollow\" target=\"_blank\">Git commit<\/a> made to the <a class=\"af ni\" href=\"https:\/\/github.com\/geofeeds\/geofeed\" rel=\"noopener ugc nofollow\" target=\"_blank\">\u201cgeofeeds\u201d GitHub repository<\/a> only 34 seconds prior not only includes all four IPv4 networks that were deleted from Pfcloud\u2019s GitHub repository, but also lists the same author, \u201cTeamAggro (~Steve)\u201d. DCSO assesses that this likely is a reference to a Hull, UK-based company named <a class=\"af ni\" href=\"https:\/\/find-and-update.company-information.service.gov.uk\/company\/14187185\" rel=\"noopener ugc nofollow\" target=\"_blank\">Aggros Operations Ltd.<\/a>, which surfaced in historical RIPE database records for prefixes announced by AS203168, as does a RIPE handle allocated to Pfcloud (\u201cpfcloud-mnt\u201d).<\/p>\n<p id=\"04ea\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Noteworthy, the timestamp of both Git commits lists \u201c+0100\u201d as a timezone, which (weakly) indicates the involved computer\u2019s clock being aligned to Central European Time (CET) rather than Greenwich Mean Time (GMT), which would be used by UK-based systems. The British Summer Time (BST), which would also result in \u201c+0100\u201d, only commences on March 31 in 2024, several weeks after the Git commits have taken place.<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\" readability=\"16\"><span id=\"4a92\" class=\"pd oc gt pa b bf pe pf l pg ph\" readability=\"26\">commit 358614d3c919471d8bba6ce31f9f9583bda3adba (HEAD -&gt; main, origin\/main, origin\/HEAD)<br>Author: TeamAggro (~Steve) &lt;49125036+TeamAggroDEV@users.noreply.github.com&gt;<br>Date: Tue Mar 5 09:55:52 2024 +0100<p>Create geofeed.csv<\/p><p>diff --git a\/geofeed.csv b\/geofeed.csv<br>new file mode 100644<br>index 0000000..63ec36f<br>--- \/dev\/null<br>+++ b\/geofeed.csv<br>@@ -0,0 +1,5 @@<br>+193.222.96.0\/24,NL,NL-LI,Eygelshoven,<br>+87.120.84.0\/24,US,US-NJ,Edison,<br>+45.128.96.0\/24,US,US-NJ,Edison,<br>+45.88.90.0\/24,FR,FR-75,Paris,<br>+194.48.251.0\/24,FR,FR-75,Paris,<\/p><\/span><\/pre>\n<pre class=\"pi oz pa pb bo pc ba bj\" readability=\"12\"><span id=\"1f85\" class=\"pd oc gt pa b bf pe pf l pg ph\" readability=\"18\"><br>inetnum: 45.88.90.0 - 45.88.90.255<br>netname: CONSTANTMOULIN<br>descr: Constantmoulin<br>org: ORG-CM304-RIPE<br>country: FR<br>geofeed: https:\/\/raw.githubusercontent.com\/pfcloud-io\/geofeed\/main\/geofeed.csv<br>admin-c: AA39986-RIPE<br>tech-c: AA39986-RIPE<br>mnt-lower: aggrosoperations-mnt<br>mnt-routes: aggrosoperations-mnt<br>mnt-domains: aggrosoperations-mnt<br>status: ASSIGNED PA<br>mnt-by: MNT-NETERRA<br>created: 2024-02-09T14:35:37Z<br>last-modified: 2024-02-09T14:35:37Z<br>source: RIPE<p>organisation: ORG-CM304-RIPE<br>org-name: Constant MOULIN<br>country: BE<br>org-type: OTHER<br>address: RUE SAINT-JACQUES 108\/3 5500 DINANT<br>abuse-c: ACRO54823-RIPE<br>mnt-ref: mnt-fr-scalynet-1<br>mnt-ref: mnt-neterra<br>created: 2022-08-23T16:10:16Z<br>last-modified: 2023-12-19T10:27:14Z<br>source: RIPE # Filtered<br>mnt-by: mnt-fr-scalynet-1<br>mnt-by: be-constantmoulin-mnt<\/p><p>role: Administration<br>address: Aggros Operations Ltd, c\/o COCENTER, Koppoldstr. 1, 86551 Aichach, Germany<br>nic-hdl: AA39986-RIPE<br>mnt-by: aggrosoperations-mnt<br>created: 2022-09-25T15:51:13Z<br>last-modified: 2023-01-27T17:05:24Z<br>source: RIPE # Filtered<\/p><p>% Information related to '45.88.90.0\/24AS203168'<\/p><p>route: 45.88.90.0\/24<br>origin: AS203168<br>created: 2024-02-10T12:33:50Z<br>last-modified: 2024-02-10T12:33:50Z<br>source: RIPE<br>mnt-by: pfcloud-mnt<\/p><\/span><\/pre>\n<p id=\"e060\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">In this case, the geofeed URL is suitable for usage as an OSINT pivot point and resembles a crucial information breadcrumb for linking Pfcloud UG and Aggros Operations Ltd. to each other and to the operational aspects of AS203168.<\/p>\n<p id=\"b5f4\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Similar to other investigative use-cases, GitHub repositories used for geofeed URL hosting may allow detailed insights into the history of an ISP, (alleged) physical facilities used by it, related personas or GitHub accounts, OpSec mistakes made by involved entities, and attempts to cover up such mistakes.<\/p>\n<h2 id=\"b28d\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">Potential Risks Induced By Geofeed Processing<\/h2>\n<p id=\"3738\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">In contrast to RIR databases, geofeed URLs carry several potential risks that geolocation database vendors and investigators alike may wish to keep in mind:<\/p>\n<ul class>\n<li id=\"2551\" class=\"mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng pm pn po bj\">While the file integrity of the vast majority of publicly downloadable RIR databases can be verified through cryptographic signatures, such information commonly is not available for geofeeds (<a class=\"af ni\" href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc9092#section-4\" rel=\"noopener ugc nofollow\" target=\"_blank\">RFC 9092, section 4<\/a>, specifies authentication of geofeed data, however, DCSO has rarely observed in-the-world deployment of this authentication scheme).<\/li>\n<li id=\"b17d\" class=\"mj mk gt ml b mm pp mo mp mq pq ms mt mu pr mw mx my ps na nb nc pt ne nf ng pm pn po bj\">Similarly, while <a class=\"af ni\" href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc9092#section-5\" rel=\"noopener ugc nofollow\" target=\"_blank\">RFC 9092, section 5<\/a>, mandates HTTPS as a protocol for publishing and retrieving geofeed URLs, the usage of other security measures such as <a class=\"af ni\" href=\"https:\/\/en.wikipedia.org\/wiki\/DNSSEC\" rel=\"noopener ugc nofollow\" target=\"_blank\">DNSSEC<\/a> or <a class=\"af ni\" href=\"https:\/\/en.wikipedia.org\/wiki\/DNS-based_Authentication_of_Named_Entities\" rel=\"noopener ugc nofollow\" target=\"_blank\">DANE<\/a> is not even discussed by this RFC, leaving geofeed downloads at risk of being silently manipulated by (more sophisticated) threat actors capable of issuing trusted X.509 certificates for arbitrary FQDNs on the fly.<\/li>\n<li id=\"f95f\" class=\"mj mk gt ml b mm pp mo mp mq pq ms mt mu pr mw mx my ps na nb nc pt ne nf ng pm pn po bj\">Particularly in cases where geofeed URLs are hosted on infrastructure under direct control by the involved ISP, different geofeed content may be presented to different clients, in order to deliberately \u201cinject\u201d certain data into certain databases or security solutions. This may be enabled by custom tooling revealing itself through unique HTTP User-Agent headers or through conducting geofeed downloads from certain IP addresses that can be attributed to organizations of interest.<\/li>\n<li id=\"e092\" class=\"mj mk gt ml b mm pp mo mp mq pq ms mt mu pr mw mx my ps na nb nc pt ne nf ng pm pn po bj\">Especially in the case of manual investigations, an ISP may also harvest such data to achieve a better understanding of ongoing investigations, as well as individuals or organizations conducting such investigations. In order not to compromise the investigator\u2019s OpSec, exercising the same caution for accessing geofeed URLs as other resources controlled by an ISP remains crucial.<\/li>\n<\/ul>\n<h2 id=\"7f37\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">Conclusion<\/h2>\n<p id=\"74f8\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">Geofeeds enable ISPs to propagate precise geolocation information on their IP networks in a decentralized, independent, and machine-digestible fashion, thus allowing geolocation database vendors to display such information with a greater likelihood (and reducing the necessity of such vendors to procure precise location data from privacy-invasive sources).<\/p>\n<p id=\"2f68\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">However, as the example of AS203168 demonstrates, geofeed contents may be worth approaching with caution. By deliberately injecting inaccurate information, rogue ISPs may seek to (selectively or opportunistically) poison databases created by geolocation and security vendors, and attempt to hamper manual investigations. DCSO therefore recommends geolocation vendors and defenders alike reconsider processing geofeeds published by ISPs with a poor reputation, and resort to filtering based on Autonomous System information rather than country-based schemes (\u201cgeoblocking\u201d) for improved accuracy. This is crucial, as it is often trivial for a threat actor to gain access to an IP address geolocated within a certain country, and countries hosting a significant fraction of today\u2019s popular internet services (which includes the Netherlands) de facto cannot be geoblocked without causing an unacceptable amount of false positives.<\/p>\n<p id=\"8c8d\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Should geoblocking be considered viable by defenders regardless, they may seek technical solutions to assess the likelihood of geolocation information having been forged by questionable ISPs. Should such an assessment return a high likelihood of grossly inaccurate information, affected network traffic should be subject to further scrutiny.<\/p>\n<p id=\"88e0\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Especially if hosted by source-code tracking infrastructure, such as GitHub repositories, geofeeds may also pose highly interesting OSINT pivot points, allowing investigators to easily unveil a greater fraction of an ISP\u2019s operation and its historical development. In order to not compromise OpSec though, geofeed URLs should be accessed with the same precautionary measures in place for interacting with other resources controlled by questionable ISPs.<\/p>\n<h2 id=\"82ad\" class=\"ob oc gt be od oe of dx og oh oi dz oj mu ok ol om my on oo op nc oq or os ot bj\">Related Information<\/h2>\n<p id=\"38ea\" class=\"pw-post-body-paragraph mj mk gt ml b mm ou mo mp mq ov ms mt mu ow mw mx my ox na nb nc oy ne nf ng gm bj\">Live Spamhaus <a class=\"af ni\" href=\"https:\/\/www.spamhaus.org\/blocklists\/spamhaus-blocklist\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">SBL<\/a>\/<a class=\"af ni\" href=\"https:\/\/www.spamhaus.org\/blocklists\/do-not-route-or-peer\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">DROP<\/a> listings concerning prefixes announced by AS203168 at the time of writing:<\/p>\n<p id=\"f1e2\" class=\"pw-post-body-paragraph mj mk gt ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gm bj\">Live Spamhaus <a class=\"af ni\" href=\"https:\/\/www.spamhaus.org\/drop\/asndrop.json\" rel=\"noopener ugc nofollow\" target=\"_blank\">ASN-DROP<\/a> listing concerning AS203168 at the time of writing:<\/p>\n<pre class=\"nm nn no np nq oz pa pb bo pc ba bj\"><span id=\"7c0c\" class=\"pd oc gt pa b bf pe pf l pg ph\">{\"asn\":203168,\"rir\":\"ripencc\",\"domain\":\"stellar-group.fr\",\"cc\":\"BE\",\"asname\":\"unknow\"}<\/span><\/pre>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35673\/How-Rogue-ISPs-Tamper-With-Geofeeds.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55627,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10882],"class_list":["post-55626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerprivacyfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T16:52:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/miro.medium.com\/v2\/resize:fill:88:88\/1*LQUpYFsLUopYafQLEFNVTA.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Rogue ISPs Tamper With Geofeeds\",\"datePublished\":\"2024-03-19T16:52:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/\"},\"wordCount\":2192,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/how-rogue-isps-tamper-with-geofeeds.png\",\"keywords\":[\"headline,hacker,privacy,fraud\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/\",\"name\":\"How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/how-rogue-isps-tamper-with-geofeeds.png\",\"datePublished\":\"2024-03-19T16:52:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/how-rogue-isps-tamper-with-geofeeds.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/how-rogue-isps-tamper-with-geofeeds.png\",\"width\":88,\"height\":88},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-rogue-isps-tamper-with-geofeeds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacyfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Rogue ISPs Tamper With Geofeeds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/","og_locale":"en_US","og_type":"article","og_title":"How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-19T16:52:54+00:00","og_image":[{"url":"https:\/\/miro.medium.com\/v2\/resize:fill:88:88\/1*LQUpYFsLUopYafQLEFNVTA.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Rogue ISPs Tamper With Geofeeds","datePublished":"2024-03-19T16:52:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/"},"wordCount":2192,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/how-rogue-isps-tamper-with-geofeeds.png","keywords":["headline,hacker,privacy,fraud"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/","url":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/","name":"How Rogue ISPs Tamper With Geofeeds 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/how-rogue-isps-tamper-with-geofeeds.png","datePublished":"2024-03-19T16:52:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/how-rogue-isps-tamper-with-geofeeds.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/how-rogue-isps-tamper-with-geofeeds.png","width":88,"height":88},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-rogue-isps-tamper-with-geofeeds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacyfraud\/"},{"@type":"ListItem","position":3,"name":"How Rogue ISPs Tamper With Geofeeds"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55626"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55627"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}