How to solve an abuse alert?

If you receive an abuse alert, you have to solve it in 48 hours.

In the case we are receiving several abuse alerts within a few hours and these abuses are due to cases of phishing, spam or bruteforce, Dedibox/ reserves the right to immediately switch the server in “rescue” mode or to suspend it to stop these actions.

  • What is Phishing?

Extract from the free encyclopedia wikipedia :

Phishing is the illegal attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

In most cases these sites appear on your Dedibox following an intentional intrusion and the someone uses your server to retrieve credit card numbers or other sensitive data.

In this specific case we strongly recommend to completely reinstall your machine.

  • What is a bruteforce?

Extract from the free encyclopedia wikipedia :

In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory, be used against any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys or passwords until the correct one is found. In the worst case, this would involve traversing the entire search space. When password guessing, this method is very fast when used to check all short passwords, but for longer passwords other methods such as the dictionary attack are used because of the time a brute-force search takes. When key guessing, the key length used in the cipher determines the practical feasibility of performing a brute-force attack, with longer keys exponentially more difficult to crack than shorter ones. A cipher with a key length of N bits can be broken in a worst-case time proportional to 2N and an average time of half that.

If you receive an abuse alert for “bruteforce”, this means you have been a victim of this action and somebody was able to enter your machine and uses it to perferm the type of attacks to other machines

*In this specific case we strongly recommend to completely reinstall your machine.__ —- In any case, once the abuse is resolved (by reinstallation, cleaning done by you or by an utility like “chkrootkit”), you have to pass the status of the abuse alert to “solved” in your management console. To do this, click on: My Account > Security alerts**