Incident report guideline

The best way to report a problem is to send an e-mail to certs@cesnet.cz and include a complete description of the problem. CESNET-CERTS members will deal with the reported incident as soon as possible and will inform you that the problem, if any, has been solved and removed. You will receive a reply from certs@cesnet.cz and the e-mail will be signed by our PGP Key.

Basic rules for creating an incident report

  • The report should be a simple text-based e-mail, with an attachment if necessary.
  • Only one IP address or address block per report, please.
  • The Subject should contain the IP address or address block and incident type (spam, virus, scanning, DDOS, hacking, phishing, pharming, alleged misuse of copyrighted work, …).
  • A report about scanning must contain a small extract from a log showing the problem, e.g.,
    • timestamp, time zone and time accuracy
    • source and destination IP addresses
    • source and destination ports
    • protocol used (TCP/UDP/ICMP).
  • A report about spam or virus must contain a copy of the mail header from the alleged infected or spamming e-mail. The header should not be changed in any way.
  • A report about spam (unsolicited commercial email) should contain both the full mail header and the original body text.
  • A report about an alleged misuse of copyrighted work must contain the following details:
    • timestamp, time zone, and whether NTP is used
    • IP address where the copyrighted work is stored
    • services used to publish or share the copyrighted work (BitTorrent, FTP, …)
    • type (name…) of copyrighted work
  • A report about phishing or pharming should contain the URL and source of the web page if possible.
  • Every report must contain your name and organization name. For urgent matters please include your phone number.
  • A report must be sent from a valid e-mail address.
  • Please indicate whether the message is informative only or if you expect an answer.

Basic incidents CESNET-CERTS deals with

Any offence against the Czech law, e.g.,

  • threats to physical safety of human beings,
  • compromise of restricted confidential service accounts or software installations, in particular those with authorised access to confidential data,
  • denial of service attacks,
  • large-scale attacks of any kind, e.g., phishing attacks, password cracking attacks, virus and spam dissemination,
  • compromise of individual user accounts, i.e., unauthorised access to a user or service account,
  • alleged misuse of copyrighted work.

To report or not to report?

We do not expect everyone to be a computer security expert. That is a role of the CESNET-CERTS team.

We do not even expect everyone to be able to properly recognize, classify and describe a security incident. So if you hesitate whether to report or not to report, report it. Any missing information will be asked for if necessary.

Thanks for your cooperation!


Last modified:: 17.03.2021 21:01