Silence Nourishes Evil: Attack Logs, CTU Settings, and Why Victims Must File Complaints
CTU-related logs revealed clear traces of unauthorized access, including patterns routed through multiple countries to obscure identity.
This essay argues that victims must not stay silent: print the evidence, report it, and file formal complaints, because only collective action can eradicate such зло.
2016-07-25
Omitted.
I learned this for the first time through the work of an SE professional.
I am someone who has continued using NTT, yet I had never known about this CTU setting until then.
When he clicked on the “unauthorized login” item in this section and saw the attacks that appeared, he was shocked.
“Port 8080 is an attempt to spy on the target PC, and ftp is an attempt to spy on files…”
I also learned for the first time that one can identify what sort of actor it is from the attacker’s IP address.
However, routing through various servers such as South Africa, Brazil, Poland, China, and within Japan itself, so that the identity cannot be immediately determined, is the same method used when Chinese cyber units and the like attack the Japanese government or corporations.
“From here on, there is nothing to do but have the police investigate.”
It goes without saying that I called the Osaka Prefectural Police on the spot.
Fortunately, the detective in charge belonged to the PC generation and had no aversion to computers, and it goes without saying that the Osaka Prefectural Police began their investigation from the next day.
If you search the internet, you can also see that quite a number of people have suffered this kind of damage.
I want to tell the victims.
Do not suffer in silence.
Every internet provider has software similar to this CTU setting, so you should print it out immediately and file a criminal complaint with the police cybercrime division.
If everyone does not file complaints, such unbelievable evil will never be eradicated.
To be continued.
