On Mar 11, 2014 3:09 AM, "Dobbins, Roland" <rdobbins@arbor.net> wrote:
On Mar 11, 2014, at 2:00 PM, Markus <universe@truemetal.org> wrote:
Any advice?
Start with CERT-BUND, maybe?
That is the correct answer, if you want something less settle (and possibly illegal), there were discussions on 'hacking back'. That is, basically having malicious documents with fake (or not) bank/personal information. If you can find who is using the info (some Comcast business IPs have the address in whois) and go OSINT from there (though if you go this route, try to contact LE before you post something and burn bridges). A note on terminology - whether you know what you're doing, actually break into a system, or obtain a thumb drive with data that you weren't supposed to have - it has the same end so I'd refer to it by the same term - hacking. Trying to differentiate terms based on skill, target, or data type is kinda dumb.