Monday, September 29. 2014
Responsibility in running Internet infrastructure
Trackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
I encountered such in my past, too.
The "abuse departments" never act fast, also some will even never act. That is really pathetic and makes stopping malware a even more useless activity.
Also, when you encountered a server which is really held by malware people as CnC or whatever, and things are getting clear that this is also rent by them, it get's really stupid when they just forward your mail. You see there, they did not read it, they just forward and wait what happens then. Then the bad actors are having a warning and you personal details, too. Great.
And what they do then? "We changed the password, everything is clear now". Aha. They just switched the ports etc and are continuing their stupid stuff.
Abuse really has to be threatened better, faster and in a more secure way.
My 2 cents.
The "abuse departments" never act fast, also some will even never act. That is really pathetic and makes stopping malware a even more useless activity.
Also, when you encountered a server which is really held by malware people as CnC or whatever, and things are getting clear that this is also rent by them, it get's really stupid when they just forward your mail. You see there, they did not read it, they just forward and wait what happens then. Then the bad actors are having a warning and you personal details, too. Great.
And what they do then? "We changed the password, everything is clear now". Aha. They just switched the ports etc and are continuing their stupid stuff.
Abuse really has to be threatened better, faster and in a more secure way.
My 2 cents.