CERT (Computer Emergency Response Team) and CSIRT (Computer Security Incident Response Team) teams are pivotal players in the global cybersecurity ecosystem. They act as coordination hubs between organizations, governments, and international entities, enabling rapid incident response and threat intelligence sharing. Effective collaboration with these teams not only safeguards individual organizations but also strengthens the resilience of entire industries and regions.
The first rule is to contact a team aligned with your organization’s geographical location or industry sector.
Sectoral teams understand sector-specific threats (e.g., ransomware targeting healthcare, phishing against banks), while regional teams navigate local regulations and infrastructure.
“On 27.05.2024 at 14:00 UTC, a credential-stuffing attempt was detected via the phishing domain bank-clients[.]support. IoCs: IP 192.168.1.100, file invoice.exe (SHA256: a1b2c3...).”
Pro Tip: Granular details accelerate analysis and increase the likelihood of IoCs being added to shared threat feeds.
A German bank identified malware in its payment system. After reporting to CERT-Finance, the IoCs were distributed to threat feeds. Within hours, similar attacks targeting French and Italian banks were preemptively blocked.
Engaging with CERT/CSIRTs isn’t just compliance—it’s a strategic contribution to collective cyber resilience. Even a small organization’s report can prevent large-scale attacks. In cybersecurity, there’s no competition—only shared adversaries and shared defense.
P.S. Join industry-specific ISACs (Information Sharing and Analysis Centers) to amplify your threat intelligence capabilities.
The example of text to fill the form, which should be written once you encountered with scum activity:
Url: http://incydent.cert.pl/domena#!/lang=pl
Incident Report: Fraudulent Website Targeting Users with Scam Activities
Dear CERT/CSIRT Team,
We are writing to report a fraudulent website engaged in scam activities.
Which we believe poses a significant risk to users.
Below are the details of the incident and relevant indicators of compromise (IoCs) for your investigation.
1. Incident Overview
Type of Activity: Scam / Phishing
Targeted Audience: General public (e.g., fake lottery, investment fraud, or impersonation of legitimate services).
Website URL: hxxps://scam-example[.]com (replace with actual URL, using hxxps to prevent accidental clicks).
Domain Registration Date: [If known, e.g., 2024-05-01]
First Observed: [Date/Time of Detection, e.g., 2024-05-27 14:30 UTC]
2. Indicators of Compromise (IoC)
Malicious Domain: scam-example[.]com
IP Address: 192.0.2.1 (hosting the fraudulent site)
SSL Certificate: Issuer: "Let's Fake Encrypt" | SHA-1: [Insert if available]
Associated Phishing Emails:
Sender: noreply@scam-example[.]com
Subject: "You’ve Won $1,000,000! Claim Now!"
Attachments/Links: hxxps://scam-example[.]com/claim
3. Additional Context
Behavior Observed:
The site mimics a legitimate lottery platform, requesting personal data (ID, credit card) under false pretenses.
Uses urgency tactics ("Act within 10 minutes!") to pressure users.
Victim Reports: [Optional: Include anonymized examples, e.g., "3 employees received phishing emails linking to this site."]
Mitigation Steps Taken:
Blocked the domain/IP internally.
Alerted employees/users via internal channels.
4. Supporting Evidence
Screenshots: Attached (e.g., scam website, phishing email).
Network Logs: [Attach HAR files, packet captures, or firewall logs if available.]
WHOIS Data: [Include if retrieved from domains.google or similar.]
5. Requested Action
We kindly ask your team to:
Investigate the domain/IP for malicious activity.
Add the IoCs to shared threat intelligence feeds (e.g., MISP, PhishTank).
Notify relevant stakeholders (e.g., hosting provider, registrars) for takedown.
Confidentiality: This report is intended for authorized use only. Please confirm receipt and provide a tracking ID for future reference.
Thank you for your prompt attention to this matter.
Best regards,
[Your Full Name]
[Your Position]
[Organization Name]
[Contact Email/Phone]