[148613] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: US DOJ victim letter

daemon@ATHENA.MIT.EDU (Dave Ellis)
Thu Jan 19 16:05:07 2012

Date: Thu, 19 Jan 2012 15:04:18 -0600
From: Dave Ellis <dave@colo4.com>
To: Michael Hare <michael.hare@doit.wisc.edu>
In-Reply-To: <4F1884B1.5020200@doit.wisc.edu>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

We've also received the emails and ignored them. If the US DOJ needs to 
contact us they use the postal service.

On 01/19/2012 03:01 PM, Michael Hare wrote:
> AS2381 has also received them, we are no further along in this than 
> you are.
>
> On 1/19/2012 2:59 PM, Jay Hennigan wrote:
>> We have received three emails from the US Department of Justice Victim
>> Notification System to our ARIN POC address advising us that we may be
>> the victim of a crime.  Headers look legit.
>>
>> We have been frustrated in trying to follow the rabbit hole to get any
>> useful information.  we've jumped through hoops to get passwords that
>> don't work and attempted to navigate a voice-mail system that resembles
>> the "twisty maze of passages all different" from an old text adventure
>> game.
>>
>> This *seems* to be legit, and I would think that the end result is
>> likely to be a list of IP addresses associated with infected hosts.
>>
>> Has anyone else received the email?  Is it legit?  If so has anyone
>> successfully navigated the maze, and if so how?  Is it worth it?
>>
>> (And why don't they just send the list of infected IPs to the ARIN
>> contact in the first place?)
>>
>> -- 
>> Jay Hennigan - CCIE #7880 - Network Engineering - jay@impulse.net
>> Impulse Internet Service  -  http://www.impulse.net/
>> Your local telephone and internet company - 805 884-6323 - WB6RDV
>>
>



home help back first fref pref prev next nref lref last post