[148781] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LAw Enforcement Contact

daemon@ATHENA.MIT.EDU (TR Shaw)
Sun Jan 22 20:30:50 2012

From: TR Shaw <tshaw@oitc.com>
In-Reply-To: <20120123011955.GC27872@vacation.karoshi.com.>
Date: Sun, 22 Jan 2012 20:29:59 -0500
To: "A. Pishdadi" <apishdadi@gmail.com>,
 NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jan 22, 2012, at 8:19 PM, bmanning@vacation.karoshi.com wrote:

> On Sun, Jan 22, 2012 at 07:16:39PM -0600, A. Pishdadi wrote:
>> Hello,
>>=20
>> We recently tracked down a botnet that attacked our network. We found =
the
>> C&C server, it has approximately 40-50 servers, consisting of mostly =
*nix
>> machines with high speed connections, for example AWS servers or =
dedicated,
>> attack capacity is 4-5Gb/s or more. Is there any contacts with law
>> enforcement here that I can send over the info too?
>>=20
>> .
>=20
> 	Sure is.  Check with your local FBI office.
>=20

Do you know how responsive and effective that is out here in rural =
america? usually nada even if you can even find someone who speaks tech.

I gave my local a C&C complete with location in Phoenix and details on =
all the Italian bank intercepts that were stored there (open directory) =
and 2 weeks later it was still operating.

Tom




home help back first fref pref prev next nref lref last post