Brute force Hacking via SSH.
I have recently been informed there is an issue in the so53 1PZ postcode area, that is to be addressed by engineering work on the 22nd of May. Simultaneously, I have been notified by the providers of my local (home) cloud devices of brute force attacks (evidenced on 3-5 May) of brute force attacks from the broadband network to my local LAN addresses, and specifically my Ethernet connected NAS devices and SSH sessions opened for remote backup between the devices. Does anyone know what the broadband issue (affecting broadband and tv services but not phone services) is and is there a connection? Secondly, how do I report network hack attacks to VM? If I try to do it via 150 phone call, the system tries to test and reboot my router first, which may remove the evidence trail.
Don't expect VM to do anything about the brute force attacks, this is just something you have to accept as part of "enjoying" internet access. If you have opened port 22 on the hub then that's your prerogative - there are many, MANY bots and scrapers out there scanning consumer IP addresses checking for well known open ports such as SSH, FTP, SMTP etc. If you open a port then you have to accept it will be attacked. You can deploy your own IDS/IPS solution to block these attacks, or implement a device level firewall to provide an additional layer of protection. There's really not much VM can do if you open a port on the hub.