Thanks everyone for the support we all very much appreciate it!
PSD CSS XHTML, yes it really is daunting when something like this happens and you have to remember that only a portion of the people who receive the emails write in to ask for an explanation. We have set operating procedures for this kind of thing and one of the goals is to do everything we can to get the word out to those people who received the email. One of those steps is to reply to each and every one of those that contact us if at all possible. This obviously depends on the volume of email we receive but we do our absolute best to get back to everyone eventually. We also put a notice on our home page and reporting page as well as a press release.
I'm happy to share our procedures for this here if it can help any of you out in the future if you get hit with something.
In the event of an attack the following procedures need to be implemented as soon as is practical and possible.
Once the attack is discovered try to detail all aspects of the attack for site notice, press release and FBI. What is the nature and purpose(s) of the attack? How large is the attack?
Depending on the nature of the attack contact hosting provider for support/technical information.
Post notice to the site explaining that this is an attack. This notice should remain in place for a minimum of 5 days after the attack ends.
Write press release detailing the specifics of the attack. Post to site and send to members and trade publications.
Monitor industry boards for posts regarding the attack and respond as necessary. Length of time to monitor boards depends on the severity of the attack.
Respond to all email inquiries in the order they were received, in as timely a fashion as possible. (depending on the volume this may be virtually impossible but it is important to respond to as many as is practicle/possible)
Contact FBI Cyber Crime Unit.
Report to Internet Crime Complaint Center
http://www.ic3.gov/ (IC3) .
Report to the FTC
[email protected]
Check the Blacklists.
Notes: There may be other secondary procedures depending on the nature and purpose(s) of the attack that would be prudent to follow up on. Examples may include; virus attachments and phishing email. Please see
http://www.fbi.gov/cyberinvest/escams.htm