Cracking down on abuse

May 24th, 2007 by

Here at UK2 we are cracking down on abuse, including fraudulent websites, phishing scams, spammers, crackers etc.

We recently beefed up our abuse team with several new members to deal with incoming abuse reports.

We’ve set up automated processes to search for fraudulent-looking mailboxes and websites which are reported to our abuse team to be investigated, and shut down if they are found to be fraudulent.

So far this week, we’ve terminated over 1,700 UK2 mailboxes for various reasons including running phishing scams and spamming.

Our improved responses have been noticed by Artists Against 419, an anti-phishing group:

…it looks like they’ve made some very positive changes. A recent email to
abuse@ resulted in closure of a scam site in approximately two hours (a very
respectable response time). So not only are they answering tickets, they’re
answering them promptly, and abuse emails are automatically routed to the
ticket system!

Thumbs up to UK2.net for improving their attitude and performance. Keep it up!

We will not tolerate abuse of our systems, and will take swift action against anyone caught doing so. If you wish to report a spammer or fraudster using our services, please raise a ticket in our abuse queue or email abuse@uk2.net. If reporting spam or phishing email please include full message headers in your report.

  • Share this post

Young women dominate UK net

Sex.com – coming to a screen near you?

4 Comments

Ditlev
# 24th May, 2007

Good to see David – I read this blog post at thewhir.

“Basically, when we find a compromised account on a server, we apply a redirection on any phish content rather than just disabling the page from view.”

They redirect all the clicks going to the phishing sites to a page that serves info on how to deal with and avoid phising.

It’s quite a cool way to deal with phishing – should we do the same?

🙂
Ditlev

David Precious
# 24th May, 2007

That’s actually a pretty neat idea… redirecting to a page which explains *why* the link they followed isn’t working any more.

In other words, a “you followed a link to a fraudulent site, and may have been about to submit your banking details to a fraudster, but we saved you 🙂 ”

For those users who fell for the scam and would have been giving away their details, it’s a stark realisation to them: “I nearly fell for that!”. That’s probably the best form of education for users, when they realise just how close they might have come to giving away personal details to a scammer, hopefully they’ll be unlikely to fall for it in the future.

That could be done reasonably easily for shared hosting accounts, but is trickier for dedicated servers (we’d need to do some routing trickery to redirect HTTP traffic for the server’s IP address(es) to another box hosting the explanation page).

I really like the graphic on that dimenoc.com anti-phish page too!

Matthew Lanham
# 26th May, 2007

Doing it where it explains may build up trust in other services you provide…

John Berry
# 28th May, 2007

A superb Idea…A proactive approach..Much better than just shutting the sites down.

How about auto appending a footer to ALL emails passing through your systems…with hyper link to abuse?

Leave a Response