The CARNET Abuse Service receives and processes reports concerning computer security incidents and the abuse of CARNET resources.
Abuse Service
Every Internet Service Provider has its Abuse Service. Abuse Service deals with the receipt and processing of incidents involving the end-users of Internet Service Providers (ISP) to which the Abuse Service belongs.
CARNET’s Abuse Service aims to receive and process incidents related to computer security incidents and misuse of CARNET resources such as:
- spam
- copyright infringement
- attempted unauthorized access
- unauthorized access
- malware
- Denial of Service
- commercial use
- Netiquette.
Users
How to Become a User
Abuse service user becomes each individual who uses the Internet connection service, upon opening an electronic identity in the AAI@EduHr system, based on which the authentication and user authorization process is performed. Abuse service users are also all members of CARNET network.
Questions and Answers
The CARNET Abuse service collects and processes requests related to computer security incidents and the misuse of CARNET resources.
The CARNET Abuse service users are all persons reporting an incident or a violation of acceptable online behavior committed by a CARNET user. The applicant itself does not have to be a CARNET user.
The starting point for each action is the fact stated in the received incident report. The Abuse Service accurately and precisely examines the available data for taking further steps. Each submission is classified according to the specified incident categories. If the Service receives a report indicating multiple potential offenses, the one assessed as most serious is processed first. The Service respects user privacy, and data is processed in the manner described in the Service's rules. The Service sends data to third parties solely based on a court order or at the request of the police during an investigation. All correspondence is archived.
You can contact the CARNET Abuse Service by email at abuse@carnet.hr or by phone at +385 1 6661 655.
Computer incidents are sent via e-mail only to abuse@carnet.hr.
The working hours of the CARNET Abuse Service are from 9 AM to 4 PM.
By the Electronic Communications Act, CARNET, as an Internet Service Provider, is obligated to retain data related to customer connections to the Internet. Accordingly, CARNET maintains a database of all its users' connections. Furthermore, by the same Act, the operator of public communication networks and publicly available electronic communication services is obliged to retain electronic communication data needed to determine the source, destination, time, duration, and type of communication. It is forbidden to retain data revealing the contents of communication. The CARNET Abuse Service responds exclusively to user emails. Retained data are disclosed only to employees of the Ministry of the Interior and the Ministry of Justice upon presentation of a warrant.
- The CARNET Abuse Service warns and sanctions CARNET network users who have violated any provision of the “Decision on the Acceptable Use of CARNET Network” and the generally accepted user behavior norms in individual communication or communication within a group. In summary, these are:
- spam – unwanted, usually commercial messages distributed to disproportionately large numbers of users
- Copyright infringement – distribution of content such as pirated software, music, or movies, which is protected by the Copyright Act.
- unauthorized access – (successful or unsuccessful) attempt to access another computer without permission
- violation of Netiquette
- Rules for opening, administering, and using user accounts on a CARNET public server
- pests: (viruses, worms, Trojans).
More
- Viruses are malicious code with the ability to self-replicate; their code is added to an existing executable file, waiting for the “infected” file to be run to become active again.
- Worms – malicious codes with the ability of self-multiplication that are widespread by copying their entire content through some media of communication, such as e-mail
- Trojans – malicious codes that are considered as harmless applications and require some user action to be installed
- Denial of ServiceDenial of ServiceDenial-of-service attacks usually work by overwhelming a specific service or network, thereby preventing legitimate users from accessing it.
- DDoS (Distributed Denial of ServiceDistributed Denial of Service (DDoS) attacks, which flood a network with traffic from multiple online sources to overwhelm it and deny legitimate users access to services.
- Phishing A set of activities by which unauthorized users attempt to trick users into disclosing confidential personal information by using fraudulent emails and fraudulent websites, such as those mimicking financial organizations.
- Incidents are generally reported to abuse services competent for the networks from which the attack originates. Therefore, in the event of an attack on your computer, it is necessary to identify the attacking network and report the incident to the Abuse Service competent for the relevant network. Computers on the Internet are identified by IP addresses, so it is necessary to determine the IP address of the attacker or the source of the e-mail and determine which Internet service provider it belongs to. Jurisdiction over IP space is divided among regional internet registers. Competence over an individual IP address can be checked on the following pages:
- Europe – RIPE
- North America – ARIN
- Latin America – LACNIC
- Asia and Pacific – APNIC
- Africa - AFRINIC.
As it is not always easy to determine the source of an attack, in the event of an inability to easily identify the network, send the notification to your ISP's Abuse Service. If the incident occurred within your organization, contact your system administrator. Incidents are reported to the National CERT (e-mail: incident@cert.hr) if your notification to the Abuse Service has not stopped illegal online activities and there is a need for mediation in handling the incident.
E-mails of the Croatian Abuse Services:
- Amis Telecom – abuse@amis.hr
- Battle.net abuse@xnet.hr
- Iscon – abuse@iskon.hr
- Optima Telekom – abuse@optima-telekom.hr
- T-Com – abuse@t-com.hr
- VIPnet – abuse@vip.hr
- Metronet – abuse@metronet.hr.
In order for the submission to be correct, it must contain the following information:
- A brief and clear description of the incident (what the user is complaining about)
- extract from the log file or message header where it is clearly visible
- IP address of the attacker
- date, time and time zone of the attack.
If you’re reporting spam or non-thematic Usenet messages, you need to include the content of the message.
It is important to note that the IP addresses for broadband access services change every time you connect, so IP addresses alone are not sufficient for uniquely identifying users. It is therefore important to specify the exact time of the incident, including the time zone, for each IP address, down to the second.
All time zones are defined in relation to Coordinated Universal Time (UTC). The time zone reference point is a zero-meridian that passes through the Royal Observatory at Greenwich, London. That is why today, the term Greenwich Mean Time (GMT) is often used today. For example, Croatia has CET time zone that corresponds to UTC + 1, i.e. if it is 2 pm in Croatia, UTC is 1 pm. During summer time, instead of CET time, CEST time is used corresponding to the UTC + 2 time zone.
- Unacceptable behavior in the CARNET network is defined by the document – “Decision on the Acceptable Use of the CARNET Network” and generally accepted user behaviour norms in communication of individuals or users in communication within the group. Any unauthorized activity described in the policy or norms of conduct is subject to the sanctions of the CARNET Abuse Service in the form of warnings and in the case of repetitive behaviour or more serious incidents, as temporary or permanent denial of Internet access.The unacceptable behaviour is:
- distribution of copyrighted material
- selling or lending your account and using another user's electronic identity
- disseminating offensive, humiliating, or discriminatory material
- sending unsolicited emails
- disabling or hindering the operation of an individual service
- spreading malware
- Unauthorized security vulnerability testing
- data destruction
- Breach of privacy.
Also, the CARNET Abuse Service shall report acts to the competent state bodies that are prohibited by the laws of the Republic of Croatia in case of more serious offenses. For example, the Criminal Code prohibits:
- racial and other discrimination
- distribution, acquisition, and possession of child pornography on a computer system; violation of confidentiality, integrity, and availability of computer data, programs, or systems
- Computer counterfeiting
- computer fraud.
It can be assumed that a computer is infected with a virus if there are issues such as:
- significantly slow computer operation
- Unknown programs are starting by themselves, usually in multiple instances.
- Inexplicable shutdown or restart of the computer
- Loss of functionality of computer protection programs (antivirus, antispyware)
- some other expressly non-standard behaviors
- Some network pages cannot be opened (typically the antivirus software manufacturer's site).
- The requested network page does not open, but some others do.
- There are also some symptoms that are a bit more difficult to check out, like unknown processes that are launched in the background.
I received the following unwanted message:
From xxx@yahoo.com Sun Nov 6 21:40:21 2005
Received: from localhost (xxx.xxx.carnet.hr [999.999.999.999]) by mars.aros.net (8.13.3/8.13.1) with SMTP id jA74eJUr088160 for ; Sun, 1 Nov 2005 21:40:21 -0700 (MST) (envelope-from geoffrey@yahoo.com)
Date: Mon, 1 Nov 2005 05:40:16 +0100
From: “Fried”
To:
Subject: Best quality drags
Message-ID: <000601c5e0b8$c128d490$f95bcf52@pc>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary=”----=_NextPart_000_0003_01C5E0C9.82D73F40"
X-Priority: 3 X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced by Microsoft MimeOLE V6.00.2900.2180
X-Virus-Scanned: ClamAV version 0.86.2, clamav-milter version 0.86 on mars.aros.net
X-Virus-Status: Clean
- When reporting an email incident, such as receiving a virus message or spam, you need the full message header for proper incident reporting. The content from the “From:” field is not sufficient for correctly identifying the sender of the disputed message, as it is most often forged. Below are some brief instructions that can assist you in retrieving the message header for some of the more popular email clients.
- Outlook Express – In the list of received messages, right-click on the message, activate the drop-down menu, and select “Properties” from it. A tab will appear where you select “Details.” The text box contains the e-mail header. Right-click anywhere in the box. In the drop-down menu, select “Select All.” The header text will be darkened. Right-click anywhere in the text again and select “Copy” from the drop-down menu.
- Mozilla Thunderbird – In the list of received messages, click to mark the spam message. On the keyboard, press “Ctrl” and “U” simultaneously. A new window opens that contains the entire header besides the message.
- Eudora – Double-clicking a spam email opens a separate window displaying the list of received messages. The displayed message does not contain the full header. To view it, click the “Blah” icon, which appends the full header to the beginning of the message.
- Gmail webmail service – Once you open the spam message, click the arrow next to the sender's name. After opening the menu, select “Show original” to open a new window with the email headers.
- Netscape Mail 6 – Select a message, from the View menu, select the Headers -> All option. The message header appears in the message window, and then click the Forward icon or from the Message menu, select the Forward option.
- There are several ways attackers can get your email address. The most common ways are:
- a person whose computer is infected with a virus has your e-mail address in their address book
- You have entered your email address on a page that cannot be safely claimed to protect your data.
- You have written your email address in a publicly accessible location (network headquarters, newsgroup, forum).
- You have subscribed to the mailing list (even if a subscriber list is not provided, the attacker may have been able to access it illegally).
It is important to note the purpose of reporting non-thematic posts to the CARNET Abuse Service. For a job to be performed with quality, it is important for users to receive quality and well-founded applications, especially since the Abuse Service cannot actively monitor all active newsgroups, primarily due to their sheer number. In general, users should report instances of targeted and repeated cross-posting, intentional disruption of participants, severe and targeted offenses, deliberate submission of non-thematic posts, and similar issues. Reporting any incorrect wording, minor instances of non-thematic posts, random non-thematic posts, and so on is counterproductive and does not contribute to establishing order on Usenet.
Once you have concluded that you can submit a report, first describe the complaint in one or two sentences, then provide a detailed header for the post and the content of the post.
I am reporting your user for sending a non-thematic message because they sent a hardware-supply message to the hardware group newsgroup, despite the existence of the hr.potraznja.hardver group.
Path: Iskon!fu-berlin.de!news.glorb.com!nntp-server.pubsub.com!CARNet.hr!not-for-mail From: “roginator” ” ) >
Newsgroups: hr.classifieds.hardware
Subject: I am purchasing hardware
Date: Wed, 2 Nov 2005 19:56:25 +0100
Organization: CARNet, Croatia
5 lines
Message-ID:
NNTP-Posting-Host: xxx.xxx.carnet.hr
X-Trace: xxx.srce.hr 1130957786 9184 999.999.999.999 (1 Nov 2005 18:56:26 GMT)
X-Complaints-To: abuse@carnet.hr
NNTP-Posting-Date: Wed, 1 Nov 2005 18:56:26 +0000 (UTC)
X-Priority: 3
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-RFC2646: Format=Flowed; Original
X-Antivirus: avast! (VPS 0543-2, 10/27/2005), Outbound message
X-Antivirus-Status: Clean
Xref: Iskon hr.offer.hardware:33531
- If you're reporting a Usenet-related incident, such as a post outside the topic, for proper incident reporting, you need a complete message header. The content from the “From:” field is not sufficient for correctly identifying the sender of the message in question. Below are brief instructions that can help you get the message header from several popular news clients.
- Outlook Express - select a message and press CTRL and F3 simultaneously. The Message Source window will display the full header of a message. Highlight the entire contents of the window and copy it. Close the window, paste the copied message and header into a new message, and send the message to the Abuse Service.
- Mozilla Thunderbird – In the list of received messages, click to mark the spam message. On the keyboard, press “Ctrl” and “U” simultaneously. A new window opens that contains the entire header besides the message.
- Google Groups – select a message, click Show Options, and then click Show Original. Copy the complete header and message and send it to the Abuse Service's email address.
- Fraudsters often copy the visual appearance of real emails from banks and other companies. Recently, fake messages are completely identical to the originals, but there are certain details that expose the fraud:
- Personal information is requested in the message.
- the urgency of the message
- links
- The body of an email is a picture
- unrealistic promises.
In any case, no one has the right, not even a system engineer maintaining the email server, to ask for your user password. Your user password is secret, known only to you, and you should use it responsibly. Phishing sites are difficult to identify because attackers are skilled at copying the visual identity of legitimate sites. Often, such fake pages have the following features:
- The domain of the web page is similar to the legitimate site's domain, but not the same.
- The login network where the password is entered is not HTTPS, but HTTP.
- If there is secure HTTPS access, the site certificate is invalid.
Some firewalls, especially if they are set to be more sensitive, can flag certain actions as attack attempts, even though other applications consider them normal and use them for their operations. If you notice this happening frequently and under different conditions, it is likely a large-scale scan of your computer. This phenomenon acts as a burglar alarm, but if your operating system is up-to-date, the threat is minimal. Such attacks do not need to be reported because there are services that forward all necessary information about them to abuse services.
The CARNET Abuse Service does not support the configuration of antivirus or other programs. For assistance with software configuration, contact the appropriate service provider or the software manufacturer.
The CARNET Abuse Service does not provide support for cleaning your computer of malicious software, reinstalling the operating system, installing antivirus software or other tools, etc. The Abuse Service may offer advice on recommended computer security practices.
If it is not deliberately caused by a direct user action, the computer is infected with a spam virus.
The first thing you need to do is check your computers connected to the internet with antivirus and antispyware tools. There are free scan tools as well as commercial versions. You can find some antivirus tools on the Abuse service website.
Since no security system is 100% effective, it's possible for the antivirus tool to show that the computer is clean when it actually isn't. There are situations when malicious software goes undetected and continues to cause problems. As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install antivirus software and a firewall.
It is also important to note that all that is required for malicious spammers is an Internet connection to port 25 (SMTP port). Removing mail software (such as MS Outlook, Mozilla Thunderbird, etc.) from your computer has no effect because the malicious software has an embedded mail client that sends spam. As a temporary measure, while the problem is not resolved otherwise, it is possible to set up a firewall that blocks network traffic to port 25, thereby preventing any e-mail from being sent, even via the e-mail client.
As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install the antivirus program and firewall.
Once the problem is resolved and the computer has been cleaned, it would certainly be advisable to take preventive steps so that the problem would no longer be repeated. It is good practice to disable the use of a computer with administrator privileges and to create user accounts with the minimum authorizations required to perform the tasks for which the computer is intended. Also, we recommend using one of the tools that have the ability to restore the computer to the original, previously stored status. After saving the computer status that is known to be “free of viruses” (for example, after a fresh installation of the operating system), it is possible, in the event of a problem, to relaunch the computer in a relatively uncompromised state in a relatively simple and fast way. For this purpose, there is a free Microsoft Steady State tool or commercial solutions like Deep Freeze. More information can be found on sys.portal.
Subject: E-mail Troubleshooting Incident Identification.
As with sending unsolicited email, unless caused by direct user action, the computer is infected by a virus attempting unauthorized access to another computer system.
The first thing you need to do is check your computers connected to the internet with antivirus and antispyware tools. There are free scan tools as well as commercial variants. You can find some antivirus tools on the Abuse service website.
Since no security system is 100% effective, it's possible for the antivirus tool to show that the computer is clean when it actually isn't. There are situations when malicious software goes undetected and continues to cause problems. As the ultimate and safest solution to the problem, you need to reinstall the operating system, install all patches, and install antivirus software and a firewall.
Once the problem is resolved and the computer has been cleaned, it would certainly be advisable to take preventive steps so that the problem would no longer be repeated. It is good practice to disable the use of a computer with administrator privileges and to create user accounts with the minimum authorizations required to perform the tasks for which the computer is intended. Also, we recommend using one of the tools that have the ability to restore the computer to the original, previously stored status. After saving the computer status that is known to be “free of viruses” (for example, after a fresh installation of the operating system), it is possible, in the event of a problem, to relaunch the computer in a relatively uncompromised state in a relatively simple and fast way. For this purpose, there is a free Microsoft Steady State tool or commercial solutions like Deep Freeze. More information can be found on sys.portal.
Subject: E-mail Troubleshooting Incident Identification.
Unfortunately, the creators of malicious programs have become more creative in evading detection by antivirus tools. There is no guarantee that any of the tools will clean up all malicious software, so it is possible that your computer is still infected even though the antivirus tool reports it as clean.
The only way to ensure your computer is completely clean is to reinstall your operating system.
Today, there is no security system in the world that will protect you 100% from viruses and other malicious software. What you can do is reduce the risk of infecting your computer with security tools (such as antivirus, antispyware, and firewall), safer operating system configuration, and more cautious use of your e-mail client and network browser.
More on the topic can be found on the CARNET Abuse Service website in the section
“Internet Security.
According to the CARNET Document CDA0035 – “Decision on the Acceptable Use of the CARNET Network” Distribution and downloading of copyrighted content is prohibited. Reproduction, distribution, storage, or processing of the work is also prohibited by the Copyright Act and related rights. The works include films, computer games, and computer programs for which the author explicitly did not issue a license to download or distribute.
After you receive a notification from the CARNET Abuse Service, you need to delete the disputed material and confirm this action to the CARNET Abuse Service by replying to the email you received. It is also necessary to cease any further copyright infringement.
No, peer-to-peer protocols are not forbidden. The laws of the Republic of Croatia and the CARNET document “Decision on the Acceptable Use of the CARNET Network” prohibit the distribution and downloading of content protected by the Copyright and Related Rights Act.
In other words, the use of peer-to-peer protocols for the exchange of computer games, movies, applications, and other copyrighted materials is not permitted.
A notification for violating netiquette has been received because you have violated some of the commonly accepted behavioral norms in group communication. More about netiquette can be found Here.
Such behavior must be discontinued in future communication on the Usenet service.
The user sanctioned by the CARNET Abuse Service has the right to appeal to the CARNET CEO. An appeal must be filed in writing, and the CARNET CEO shall make a decision on the appeal within 30 days of its filing.
You can enable forwarding as follows:
- log in to the webmail school system at https://webmail.skole.hr/
- Click on “Filters” and then on “Forward”
- Enter one or more email addresses to which you want to forward messages
- If you want copies of messages to remain in your account, select this option by checking the box.
- Click the “Save” button to save the settings.
You can find more information about the CARNET webmail system at: https://helpdesk.carnet.hr/CARNET_Webmail
Important Documents
The acceptable behaviour of the CARNET network user is defined by the document CDA0035 – “Decision on the Acceptable Use of the CARNET Network” as well as generally accepted user behaviour norms in communication of individuals or users in communication within the group.
The Rules of the CARNET Abuse Service are governed by the document CDA0038 – “CARNET Abuse Service Rules”.
Contact Details
CARNET Helpdesk
Phone: +385 1 6661 555
E-mail: helpdesk@carnet.hr