Module 9
Response - Infrastructure takedown
Last updated on: 26 July 2024
Edit this page on GitHubModule 9
Last updated on: 26 July 2024
Edit this page on GitHubIn the previous sub-topics, we looked at how you can identify infrastructure that serves malicious content, be it spam, malware, or phishing. Once you have successfully done so, it’s time to warn others about it. In this subtopic, we cover abuse-reporting and other safe browsing and sinkhole mechanisms. This includes contacting the infrastructure provider to report malicious infrastructure so that it can be taken down.
Pair this effort with broader incident response activities including threat sharing and reaching out to communities which may have also been targeted by the attacks originating from the same infrastructure.
After completing this subtopic, practitioners should be able to do the following:
Many instances of malicious infrastructure run on mainstream commercial service providers concerned with maintaining their system safety, stability, reputation, and tackling cyber threats. Responsible service providers offer effective abuse reporting mechanisms. Utilizing these mechanisms may lead to a prompt takedown of active infrastructure.
Learn how to locate and utilize these abuse reporting mechanisms. Abuse contacts are available through numerous mechanisms:
Remember there may be multiple service providers involved. For instance, a phishing landing page can be reported both to the web hosting provider and to the domain registrar.
Learn how to write an abuse report with the technical information you have collected. Your report should include sufficient details so that the service provider can identify what specific account on their platform is serving malicious content. This may include the following:
While providing screenshots or attachments, ensure you are not compromising sensitive information from yourself or your clients being targeted by the malicious content.
While it is unlikely that service providers will offer additional information on the user account perpetrating abusive content, you may attempt to request such information in case it is helpful to your investigations.
In some cases, internet service and technology companies make a special effort to coordinate with civil society on targeted attacks and may offer additional support. It may be worth working with a CiviCERT member organization to seek a company contact for purposes of investigations and expedited rapid response.
Note that in many cases malicious infrastructure is hosted on compromised accounts or servers of parties unrelated to the attack (e.g. a compromised Google account, a hacked website, or an infected device coordinated in a botnet).
If you are looking for inspiration on how to write an email message to an infrastructure provider, check out the following templates created by the Access Now Helpline:
In addition to reaching out to abuse contacts for content takedown, there exists various mechanisms to have malicious infrastructure or other malicious indicators be added to blocklists and databases which are integrated in widely utilized tools and services.
The same principle applies to social media and messaging platforms, and they rely on the abuse or content reporting procedures on those platforms (or complementary safety services).
Learn about some of these blocklists, where they are integrated, and how to report to them, such as:
Work with a mentor or peer who has some experience in taking down malicious infrastructure. Do the following tasks with them:
RIPEstat launchpad
FreeA service which allows you to search for and list relevant abuse reporting mechanisms.
Getting Started - Abusix
FreeA getting started guide to the Abuse Contact DB.
Twilio abuse reports
FreeYou can report unwanted phone calls or SMS messages from phone numbers hosted on Twilio here.
Mailchimp abuse reports
FreeYou can report any abuse that takes place on Mailchimp’s platform here.
CiviCERT
FreeA network of security professionals who help civil society address cybersecurity issues.
Templates of emails we could send to report malicious activity
FreeThree email templates that allow you to easily craft an email to a domain registrar, hosting provider, or client to inform them about the presence of malicious infrastructure. Registrar: Link, Hosting provider: Link, Client: Link
Send a SafeBrowsing report
FreeHere you can send SafeBrowsing reports to a Google-maintained database which reaches a huge amount of users.
PhishTank
FreeA collaborative list of phishing site submissions, allows users to search for and submit URLs.
AbusiveIP
FreeAllows users to both search for and report IP addresses linked to malicious behavior.
Phishing Database
FreeOne more crowdsourced database of suspected phishing domains and links.
Abuse ch
FreeA community-driven platform focusing on threat intelligence regarding malware and botnets.
Phish.gg documentation
FreeA service where you can report phishing on services such as Discord.
Congratulations on finishing Module 9!
Mark the checkbox to confirm your completion and continue to the next module.
Marks the current module as completed and saves the progress for the user.
You've completed all modules in this learning path.