<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>ThreatSTOP has a simple, effective solution to blocking network communication with Crimea. But we discovered it wasn't really simple at all to block this<a href="https://www.treasury.gov/resource-center/sanctions/Programs/Documents/ukraine_eo4.pdf" rel="noopener" target="_blank"> new addition to the ITAR sanction list</a>, while allowing communication with the rest of Ukraine.</p> <p><!--more--></p> <p><span style="font-weight: bold;">Geo-blocking isn't rocket-science, until it is (or has to be).</span>&nbsp;Looking for a list of IP addresses that represent a country? You're in luck, there are lots of products from <a href="https://www.maxmind.com/en/home" rel="noopener" target="_blank">MaxMind</a>, <a href="https://www.home.neustar/" rel="noopener" target="_blank">Neustar</a>, and dozens of other vendors. But what about an area within a country? And what if the area was annexed by Russia? The question of whether an IP addresses is in Russia, Crimea, or Ukraine is tricky, and not clear at all.<br><br><span style="font-weight: bold;">Pick any three of the geo-location vendors and you’ll get three different answers.</span> For a given IP address in Crimea (we tested) one vendor will say “Yalta, Crimea”, one will say “Sadovoye, Respublika Adygeya” (somewhere fairly nearby in Russia) and one will say “Ukraine” and point you to Kiev. Take a different IP address and similar things will happen, only now the answers will change to “Moscow, Russia”, "Makaylolaiv, Ukraine" and the third will come back as “Simferopol, Crimea” etc. Every vendor has a different answer, and consistency is entirely out the window.<br><br><span style="font-weight: bold;">When you really dig down</span>, all the IP geo-location services will tell you the results they give are accurate to within a radius of 100-1000km (depending on location, some will give you a specific accuracy per IP). 1000km from Crimea is useless in terms of accuracy, as it includes seven different countries surrounding the Black Sea and possibly over a dozen more. But even 100km accuracy is poor given that Crimea is peninsular, with dimensions of 200km N-S and 300km E-W. 1000k accuracy starts to feel like attempting detailed surgery with a logging axe.<br><br><span style="font-weight: bold;">So how do you use any of these commercial services to accurately block access to/from Crimea? Well... It turns out you don't.</span> In fact, there’s a pretty simple alternative solution to blocking these potential indicators of compromise. All internet transit into Crimea is via a specially setup subsidiary of Rostelecom called "Miranda Media" that controls the fiber link across the Kerch Strait. Thus any IP address in Crimea will be advertised to the rest of the world via that ASN (AS 201776). This is of course a dynamic and changing list, and a couple of ISPs are just on the other side of the strait, but ThreatSTOP updates our threat intelligence and data sources continuously, taking the effort and risk out of it for customers.</p> <ul> <li><span style="font-weight: bold;">Using the AWS WAF</span> and want to block ITAR (including Crimea)? <a href="https://aws.amazon.com/marketplace/pp/prodview-nljlmgzzm2wje?ref_=srh_res_product_title" rel="noopener">Use our AWS WAF Managed Rules</a></li> <li><span style="font-weight: bold;">Want to block DNS traffic</span> to Crimea, sanctioned countries, and other threats? <a href="/solutions/threatstop-dns-firewall-overview" rel="noopener">Check out DNS Defense</a></li> <li><span style="font-weight: bold;">Want to prevent inbound attacks</span> and machine-to-machine communications? <a href="/solutions/ip-firewall-protection" rel="noopener">IP Defense gets it done</a></li> </ul> <p style="text-align: center;">&nbsp;</p> <p style="font-weight: bold;"><em>Get an expert-led overview of ThreatSTOP to see how it instantly blocks attacks on your network:</em></p> <p style="font-weight: bold;"></p> <p style="font-weight: bold;">&nbsp;</p> <p style="font-weight: bold;">&nbsp;</p> <p style="font-weight: bold;">About ThreatSTOP<br><span style="font-weight: normal;">ThreatSTOP is a real-time IP Reputation Service that delivers automated block-lists directly to a user's firewalls, DNS servers, and other network and security control points, so they can enforce it. It is a cloud-based service that protects the user's network against the most serious information security problem today —malware designed to steal valuable data perpetrated by organized criminals. ThreatSTOP enables existing hardware and network infrastructure systems to enforce user defined malware blocking policies without requiring the expense, complexity and time of dealing with threat intelligence or new equipment. It can be deployed within an hour and requires no ongoing management. Founded in 2009, ThreatSTOP is headquartered in San Diego, CA.</span><span style="font-weight: normal;"></span></p></span>