[148610] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

US DOJ victim letter

daemon@ATHENA.MIT.EDU (Jay Hennigan)
Thu Jan 19 16:00:41 2012

Date: Thu, 19 Jan 2012 12:59:41 -0800
From: Jay Hennigan <jay@west.net>
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

We have received three emails from the US Department of Justice Victim
Notification System to our ARIN POC address advising us that we may be
the victim of a crime.  Headers look legit.

We have been frustrated in trying to follow the rabbit hole to get any
useful information.  we've jumped through hoops to get passwords that
don't work and attempted to navigate a voice-mail system that resembles
the "twisty maze of passages all different" from an old text adventure
game.

This *seems* to be legit, and I would think that the end result is
likely to be a list of IP addresses associated with infected hosts.

Has anyone else received the email?  Is it legit?  If so has anyone
successfully navigated the maze, and if so how?  Is it worth it?

(And why don't they just send the list of infected IPs to the ARIN
contact in the first place?)

--
Jay Hennigan - CCIE #7880 - Network Engineering - jay@impulse.net
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV


home help back first fref pref prev next nref lref last post