How to Submit an Incident Report

Sentinel Protocol Team
Sentinel Protocol
Published in
3 min readNov 14, 2018

Author: Nobel Tan, Head of Security Operations

IMPORTANT: Do not include any of your personal information such as private keys, phone numbers, credit card information or password in the reporting portal. We, including Uppsala employees and the Sentinels will never ask for such information under any circumstances.

You can report to the Sentinels by browsing directly to our reporting URL “https://portal.sentinelprotocol.io/create/case” or by clicking the Report Now button on the Chrome or Firefox extension as shown in Figure 1.

Figure 1

Once you open the reporting portal website, you can fill in the necessary information as mentioned in the section below:

Section 1

Figure 2

Security Type:

Blacklist — These indicators would be reviewed and considered as malicious content, which would be blocked in all instances.

Whitelist — These indicators would be reviewed and considered as legitimate content, which shall not be blocked in any instance. The Sentinels will also watch for false negative reports where bad actors attempt to submit their malware as legitimate content, which will not be whitelisted.

Section 2

Figure 3

Reporting Target: Any malicious indicator such as URL, IP address, or wallet address that you believe is being used to cause potential harm to anyone. For URLs, it is recommended to include the HTTP or HTTPS.

Data Type: This field automatically filled once you enter the content in Reporting Target text field. If you believe the data type is incorrect, please select the correct choice from the drop-down list.

Sub Type: This field automatically filled once you enter the content in Reporting Target text field. If you believe the data type is incorrect, please select the correct choice from the drop-down list.

Tags: Please use at least one (1) or more tags related to the Reporting Target.

Section 3

Figure 4

Details:

Please describe what happened in as much detail as possible.

For example:

· Describe how you could have lost your crypto assets.

· Describe how you believe may have found a potential suspicious website or wallet address.

· Did you accidentally browse to a suspicious site?

· Did you receive a suspicious email?

· Did you download any suspicious files?

Section 4

Figure 5

Attachments (optional): It is recommended to provide as much evidence such as screen captures of malicious sites or emails that attempted to compromise your online activities.

Section 5

Figure 6

Contact Point: Please provide an email address where we could reach you if we need to clarify any information you submitted.

Once you click the Submit button as shown in Figure 6 and the report is successfully submitted, you should see a pop-up notice as shown in Figure 7:

Figure 7

--

--

Sentinel Protocol Team
Sentinel Protocol

Operating on blockchain technology, Sentinel Protocol harnesses collective cyber security intelligence to protect crypto assets against hackers, scams and fraud