Because unless everyone files charges, such unbelievable evil will never be eradicated.
July 25, 2016
[Omitted passage]
July 25, 2016
[Omitted passage]
It was through the work of the systems engineer that I first learned about it.
Although I had been using NTT services all along, I had never known about the CTU settings.
Although I had been using NTT services all along, I had never known about the CTU settings.
When he clicked on the “unauthorized access” item and saw the attacks listed there, he was stunned.
"This thing labeled 8080 is used to try to spy on the target’s PC, and 'ftp' is used to try to steal files..."
I also learned for the first time that it’s possible to identify the attacker using their IP address.
However, the fact that they route their attacks through various servers—such as in South Africa, Brazil, Poland, China, and even within Japan—to conceal their identity is the exact same tactic used by Chinese cyber units when attacking the Japanese government or corporations.
“From this point forward, it’s up to the police to investigate.”
Needless to say, I called the Osaka Prefectural Police right there on the spot.
Fortunately, the detective in charge belonged to the PC generation and held no aversion toward computers.
It goes without saying that the Osaka police began their investigation the very next day.
It goes without saying that the Osaka police began their investigation the very next day.
A quick internet search reveals that quite a few others have been victimized in the same way.
To all those victims, I want to say this:
Do not suffer in silence.
All internet service providers have software similar to this CTU setting, so you should print out the logs immediately and file a complaint with the cybercrime division of the police.
Because unless everyone files charges, such unbelievable evil will never be eradicated.
(To be continued.)