Opening up another pet peeve I see.. 

Yes, (and absolutely no reflection on the MS lurkers on this list) this is a 
pain point, of our team as well.

A lot of attention was given to Microsoft's role in take down's of miscreants 
that are attacking them, but when the attacker is on Azure, the story is quite 
different.  But this is not just about Microsoft, but about several big cloud 
providers. Not only is it very difficult to get a response, but when you do it 
is usually "We have notified the customer", or even worse, "We have notified 
the reseller" and that's where it ends.  Hackers are turning more often to 
these providers simply because of the slow take downs.

Now, with spammers it is pretty simple, block the source IP, but when the 
spammer is sending malicious materials, like virus' and ransomware, there needs 
to better take downs, otherwise the bad actor simply continues on.  We see 
there is also a big trend towards AUTH attacks, using Azure IP Space to hack 
email accounts, BEC (Business Email Attacks), and other activity that is 
dangerous and illegal.

These threats as a community we should NOT tolerate.  IF the server was hacked, 
and the owner is not  at fault, it should STILL be taken down, it is dangerous 
every second it is up, and the hacker is making money every second, and the 
longer he can do that, the more he will try again.

Now, don't get me wrong, I think I understand WHY takedowns practices is so 
bad.  Aside from the very low budget given to abuse teams, when you have 
management telling you that all you can do is 'let the customer know', as an 
abuse person you would get pretty jaded.. hard to respond to a complaint, when 
your know your hands are tied. This isn't a new phenonom, the problem is over 
20 year old, "Don't do anything that could possible affect a paying customer" 
We still have ISP's that aren't blocking port 25 outbound from dynamic IP 
space. 

But I boldly predict that this is the year that things will change.  Attitudes 
are changing.  (The removal of Trump from Twitter is a good example) The last 
few years too much emphasis has been placed on 'privacy' protection and user 
rights, and the bad guys are benefiting from those practices.  

It isn't hard to stop, many of us in the infosec field could be giving data 
feeds to the big players, if they can't see it themselves, (sure maybe these 
;arge providers should contribute more to these infosec players), but I am sure 
many would offer it for free, IF they knew it would have an impact.  I know our 
team has probably not bothered to even report these to Azure anymore, because 
it is a waste of time, and that's sad.  I mean, the volume we see everyday it's 
simply impossible to go through the standard 'reporting channels'. I know many 
others who have given up.  And this means more 'last resort' activity instead, 
and by that I mean 'blacklisting' or blocking traffic of those that don't 
respond to take down requests.

Speaking to the cyber crimes people in my circle, I hear it more and more. They 
are simply fed up.  They are going to get more aggresive and simply start with 
take down orders, when a provider doesn't seem to co-operate.  You can expect a 
lot more.. how best to describe it.. heavy handed approaches.

You can help, you can lobby your politicians to allow more to be done, and you 
can expect that "this is the year where providers will start becoming 
responsible for the activity on their networks", legally...

Sure, the ISP's and Hosting companies are fighting that, but it's on their own 
heads.  If they would have done more on their own, it would not have reached 
this point.

There is too much damage being done, the criminals are too successful.. This is 
the year when people are going to get fed up I predict, and are going to demand 
change.  We already are seeing faster take down's of dark web sites, more 
networks getting shutdown, and more domain names being shutdown.. but the next 
step is coming.. 

2021 is going to be a great year everyone! Let's all do what we can to make the 
world a safer place.





On Thu, 14 Jan 2021 12:34:27 +0100
Peter Nicolai Mathias Hansteen via mailop  wrote:
> 
> 
>> 14. jan. 2021 kl. 12:20 skrev Hans-Martin Mosner via mailop :
>> 
>> Am 09.12.20 um 08:43 schrieb Hans-Martin Mosner via mailop:
>>> Today we got a response to our abuse reports requesting that we report 
>>> these to j...@office365.microsoft.com - I
>>> would've thought that within one corporation, forwarding of abuse tickets 
>>> should work somehow.
>> 
>> Well it looks like reporting to j...@office365.microsoft.com is completely 
>> useless. No response, no reaction, no
>> reduction in spam.
>> 
>> Is there a reporting address for azure that is read and acted upon?
> 
> I tend to include abuse at the parent domains (hotmail.com , outlook.com  and 
> Microsoft.com) as cc:. You probably will not get any response other than the 
> automated one from «The Outlook team», but the flow has decreased somewhat 
> since I started cc-ing those addresses.
> 
> - Peter
> 
> —
> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
> "Remember to set the evil bit on all malicious network traffic"
> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
> 
> 
> 
> 
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop
> 


--
-- 
"Catch the Magic of Linux..." 
------------------------------------------------------------------------ 
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
------------------------------------------------------------------------ 
A Wizard IT Company - For More Info http://www.wizard.ca 
"LinuxMagic" is a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to