Incident Reporting

Once you have completed your report, you will find specific help for dealing with the situation.

Reports can be anonymous or using an account.

Please be aware that, depending on the type of incident and the country in which it took place, immediate action, e.g. by the police, may be possible or not.

Ransomware - Has ransom been extorted from youTry this

Files have been encrypted, have disappeared or have been renamed. A blackmailer demands a ransom to restore the data. More info

We have called in the law enforcement authorities.
In which country did the incident occur?

When did the incident occur?
We will involve law enforcement.

In order to bring the ransomware to justice, the agency must secure evidence, please make sure, that you...

We know, who to contact.
We need more information on how to proceed.
We do not what to involve law enforcement.
We have payed a ransom Try this
In which country did the incident occur?

Did the ransomware stop after the ransom was paid?

Can you tell how the ransomware called itself?

In which cryptocurrency was the ransom paid?

Can you share the cryptocurrency address to which the ransom was transferred? More info

When did the incident occur?


Type of your organisation

Optional contact

If you wish to be contacted, but otherwise want to stay anonymous, please tell us how you want to be contacted. This information will not be passed on to any third party except a law enforcement agency.


Upload Documents

Do you want to upload screenshots or other documents?


 

Try this    


Thank you for reporting

Your case number is NL-hu1s7dsh0hfx

Malware - Has harmful software been installed on one ore more computers?

Software that attempts to cause damage on a computer. This can include the interception of communications, the theft or destruction of data or the manipulation of an e-banking transaction. More info

Lorem
Lorem ipsum
afasdfas
asdfasdfa

DDoS - Can a server no longer serve its purpose because of too many malicious requests?

Attack on the availability of websites or other internet services. These services are overloaded by a large number of requests. More info

Lorem
Lorem ipsum
afasdfas
asdfasdfa

Phishing - is used to trick someone into revealing secret data or using a malicious link. Websites, messages, emails and phone calls are skillfully spoofed.Try this

Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim. More info

We received a message, but nobody has yet, typed on a link or opened a documentTry this

Don't click on any link nor open any attached document!
Check the sender and the receipient. Do they make sense or are they suspicious?
Is the contents suspicious? Strange images? Lots of typos?

Yes, one or more of the above items look suspiciousTry this
What was the message about?

Sender of the message

Optional contact

If you wish to be contacted, but otherwise want to stay anonymous, please tell us how you want to be contacted. This information will not be passed on to any third party except a law enforcement agency.


Upload Documents

Do you want to upload screenshots or other documents?


 

Try this    


No, none of the above items look suspicious
Most probably, it is no phishing email, but unless you need the email for some reason, just delete it.
We have become a victime of phishing

More Categories will be added here...

Häcksen
Mit Häcksenbesen
Ohne Häcksenbesen
Hacker