Sunday, April 13, 2014

REPORT CYBER ATTACKS

Here I will suggest a couple of useful links to report attack from cyber attack


U.S. Department of Justice


 Federal Bureau of Investigation


 Washington, D.C. 20535-0001

FOR IMMEDIATE RELEASE NATIONAL PRESS OFFICE
June 13, 2007 (202) 324-3691
 www.fbi.gov

OVER ONE MILLION POTENTIAL VICTIMS OF BOTNET CYBER CRIME

Washington, D.C. – Today the Department of Justice and FBI announced the results of an
ongoing cyber crime initiative to disrupt and dismantle “botherders” and elevate the public’s
cyber security awareness of botnets. OPERATION BOT ROAST is a national initiative and
ongoing investigations have identified over one million victim computer IP addresses. The FBI
is working with our industry partners, including the Computer Emergency Response Team
Coordination Center at Carnegie Mellon University, to notify the victim owners of the
computers. Through this process the FBI may uncover additional incidents in which botnets
have been used to facilitate other criminal activity.

 A botnet is a collection of compromised computers under the remote command and
control of a criminal "botherder." Most owners of the compromised computers are unknowing
and unwitting victims. They have unintentionally allowed unauthorized access and use of their
computers as a vehicle to facilitate other crimes, such as identity theft, denial of service attacks,
phishing, click fraud, and the mass distribution of spam and spyware. Because of their widely
distributed capabilities, botnets are a growing threat to national security, the national information
infrastructure, and the economy.

 “The majority of victims are not even aware that their computer has been compromised
or their personal information exploited,” said FBI Assistant Director James Finch, Cyber
Division. “An attacker gains control by infecting the computer with a virus or other malicious
code and the computer continues to operate normally. Citizens can protect themselves from
botnets and the associated schemes by practicing strong computer security habits to reduce the
risk that your computer will be compromised.”

 The FBI also wants to thank our industry partners, such as the Microsoft Corporation and
the Botnet Task Force, in referring criminal botnet activity to law enforcement.

 Cyber security tips include updating anti-virus software, installing a firewall, using
strong passwords, practicing good email and web security practices. Although this will not
necessarily identify or remove a botnet currently on the system, this can help to prevent future
botnet attacks. More information on botnets and tips for cyber crime prevention can be found
online at www.fbi.gov.
 1

The FBI will not contact you online and request your personal information so be wary of
fraud schemes that request this type of information, especially via unsolicited emails. To report
fraudulent activity or financial scams, contact the nearest FBI office or police department, and
file a complaint online with the Internet Crime Complaint Center, www.ic3.gov.
To date, the following subjects have been charged or arrested in this operation with
computer fraud and abuse in violation of Title 18 USC 1030, including:

o James C. Brewer of Arlington, Texas, is alleged to have operated a botnet that
infected Chicago area hospitals. This botnet infected tens of thousands of computers
worldwide. (FBI Chicago);

o Jason Michael Downey of Covington, Kentucky, is charged with an Information with
using botnets to send a high volume of traffic to intended recipients to cause damage
by impairing the availability of such systems. (FBI Detroit); and

o Robert Alan Soloway of Seattle, Washington, is alleged to have used a large botnet
network and spammed tens of millions of unsolicited email messages to advertise his
website from which he offered services and products. (FBI Seattle)

The FBI will continue to aggressively investigate individuals that conduct cyber criminal
acts.



Internet Crime Prevention Tips

Internet crime schemes that steal millions of dollars each year from victims continue to plague the Internet through various methods. Following are preventative measures that will assist you in being informed prior to entering into transactions over the Internet:

Auction Fraud
Counterfeit Cashier's Check
Credit Card Fraud
Debt Elimination
DHL/UPS
Employment/Business Opportunities
Escrow Services Fraud
Identity Theft
Internet Extortion
Investment Fraud
Lotteries
Nigerian Letter or "419"
Phishing/Spoofing
Ponzi/Pyramid
Reshipping
Spam
Third Party Receiver of Funds

http://www.ic3.gov/


Internet Fraud


900 Numbers and Pay-Per-Call Services

Pay-per-call services provide live or recorded information and entertainment-everything from sports scores and weather forecasts to psychic readings and chat lines. Unfortunately, charges for these services may appear on your phone bill even if you never ...

Advance Fee Loans

When you need money, a promise to give you a loan or help you get one (even if you have a bad credit record) may seem like the answer to your prayers. But beware–it could be a crook trying to steal your money, not lend you money. Don’t pay upfront. It’ ...

Bogus Credit Card Offers

It's more convenient to use credit cards than cash or checks, especially for large purchases. But companies that offer to help you get a credit card may intend to steal your money instead. Don’t fall for promises that you’ll get a credit card even if y ...

Business Opportunities and Franchises

The ad promises that you can be your own boss and make big profits. It sounds good, but crooks may be trying to steal money, not help you earn it. Don’t believe claims that you can make money with little or no effort. It takes hard work to run your own ...

Charity Scams

You want to help people in need, but you also want to be sure that your charitable donation isn't simply going into a crook's pocket. If you’re approached by an unfamiliar charity, check it out. Most states require charities to register with them and f ...

Computer Equipment and Software

You can find good deals on computer hardware and software on the Internet, but some offers may be too good to be true. Since these items are expensive, it pays to play it safe when you buy online. Know who you’re dealing with. If the seller is unfamili ...

Credit Card Loss Protection

If your credit card is lost or stolen, it can certainly be inconvenient. But beware of crooks that use scare tactics and false information to sell protection that consumers don't need. Know your rights. Under federal law, you’re not responsible for any ...

Credit Repair

Good credit is important–a bad credit history can prevent you from getting a loan, housing, or a job. Promises to "fix" your credit report may be tempting, but they're not true. No one can erase negative information if it’s accurate. Only incorrect inf ...

Fake Check Scams Popular

Fake check scams are clever ploys designed to steal your money. You can avoid becoming a victim by recognizing how the scam works and understanding your responsibility for the checks that you deposit in your account. If someone you don’t know wants to pa ...

Government Grants

Claims of "free government grants" from the US government asking for personal information such as your Social Security and bank account numbers or pay a "processing fee." But instead of giving you a grant, the plan is to steal your identity, your money, o ...

Internet Access Services

Many companies offer connections to the Internet, help creating a Web site, and other Internet services. Some of these services are specifically geared to businesses that want to offer their own products or services online. Unfortunately, some companies t ...

Internet Merchandise Sales

The Internet opens up a world of products and services, including some that may not normally be available in your area. You can shop conveniently, any time of the day or night. But while there are many legitimate companies online, there are also fraudulen ...

Investment Fraud

Whether you have a little money or a lot, you'd probably like to have more to "feather your nest." But your money could fly away if you get caught in an investment scam. Don’t believe claims that there is no risk. There is always risk in investments, a ...

Job Scams

The ad promises to help you get a good-paying job, but how do you know it's not a con artist doing a job on you? Don’t pay a fee upfront. Most legitimate employment agencies don’t charge unless they actually succeed in getting you a job, and often it’s ...

Lotteries and Lottery Clubs

Congratulations! You get a call or letter informing you that you can win millions in a foreign lottery. Is this your lucky day? Nope, it's a scam. Crooks take advantage of our natural desire to win. You see state lotteries and other contests advertised ...

Magazine Sales Scams

Someone offers you a great deal on new subscriptions or to renew your current ones. But it could be a con artist trying to trick you into spending more than you realize or paying for magazines that you'll never receive. Ask for written information befo ...

Malware

You can download programs on the Internet to look at pictures, play games, listen to music, and enjoy other activities. Beware of "dangerous downloads" that may result in computer problems or expenses that you did not anticipate. Some downloads contain ...

Nigerian Money Offers

Someone has contacted you from Nigeria or another African country and offers you millions of dollars. All you have to do is help transfer money, diamonds, or other riches to your bank account for safekeeping. It sounds like a dream come true, but it's rea ...

Online Auctions

Looking for a new DVD player? Collect Barbie dolls? You can find almost anything for sale through online auctions. But be careful, or your money might be going, going, gone! Understand how the auction works. Many online auctions simply list items that ...

Phishing Popular

You've probably heard about identity theft–people stealing other people's personal information to use for illegal purposes. In a scheme called "phishing," ID thieves trick people into providing their Social Security numbers, financial account numbers, PIN ...
If your business has been victimized by an cyber attack, you should notify the appropriate authorities. This gives you a chance to recoup any losses and ensure that the attackers are brought to justice.
Here are some tips for responding to various sorts of online incidents:
  • Hacker attacks and computer viruses: Disconnect the affected computer from the Internet and having it thoroughly scanned and cleaned, either by your internal IT department or a specialist. Report any suspected Internet crimes to the FBI.
  • Spyware: Run a spyware scan or have it professionally diagnosed and cleaned. Report spyware incidents to the Federal Trade Commission‘s OnGuard Online website at www.onguardonline.gov/file-complaint.aspx.
  • ID Theft: Visit the Fraud and ID Theft page to learn how to recover your identity. The FTC also has resources about reporting breaches and a sample letter to show how you can notify customers. 
  • Online Shopping Fraud: Be careful who you conduct business with online. If you are defrauded in an online transaction, try to resolve things with the seller. If that fails, you can report incidents to:
The United States Computer Emergency Readiness Team (US-CERT) also maintains an incident reporting system for computer security incidents.
https://www.staysafeonline.org/business-safe-online/report-cyber-attacks/

No comments:

Post a Comment