[148615] in North American Network Operators' Group
Re: US DOJ victim letter
daemon@ATHENA.MIT.EDU (Michael J McCafferty)
Thu Jan 19 16:06:03 2012
From: Michael J McCafferty <mike@m5computersecurity.com>
To: Jay Hennigan <jay@west.net>
In-Reply-To: <4F18843D.3050101@west.net>
Date: Thu, 19 Jan 2012 13:05:18 -0800
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
We've been getting them too. I haven't event thought to follow up. DOJ
won't email you with a do not reply.
On Thu, 2012-01-19 at 12:59 -0800, Jay Hennigan wrote:
> We have received three emails from the US Department of Justice Victim
> Notification System to our ARIN POC address advising us that we may be
> the victim of a crime. Headers look legit.
>
> We have been frustrated in trying to follow the rabbit hole to get any
> useful information. we've jumped through hoops to get passwords that
> don't work and attempted to navigate a voice-mail system that resembles
> the "twisty maze of passages all different" from an old text adventure
> game.
>
> This *seems* to be legit, and I would think that the end result is
> likely to be a list of IP addresses associated with infected hosts.
>
> Has anyone else received the email? Is it legit? If so has anyone
> successfully navigated the maze, and if so how? Is it worth it?
>
> (And why don't they just send the list of infected IPs to the ARIN
> contact in the first place?)
>
> --
> Jay Hennigan - CCIE #7880 - Network Engineering - jay@impulse.net
> Impulse Internet Service - http://www.impulse.net/
> Your local telephone and internet company - 805 884-6323 - WB6RDV
>
--
************************************************************
Michael J. McCafferty
CEO
M5 Hosting
http://www.m5hosting.com
Like us on Facebook for updates and photos:
https://www.facebook.com/m5hosting
************************************************************