{"id":3296,"date":"2013-06-07T16:38:14","date_gmt":"2013-06-07T20:38:14","guid":{"rendered":"http:\/\/acro.net\/blog\/?p=3296"},"modified":"2013-06-07T16:42:37","modified_gmt":"2013-06-07T20:42:37","slug":"blast-from-the-distant-past-network-solutions-and-domain-security","status":"publish","type":"post","link":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/","title":{"rendered":"Blast from the distant past: Network Solutions and domain security"},"content":{"rendered":"<p>It&#8217;s been almost five years since I released some information on domain security, as implemented by Network Solutions in the past; those were the days that domain registration was a monopoly.<\/p>\n<p>In a post titled &#8220;<a href=\"http:\/\/acro.net\/blog\/domains\/sedo-scammers-take-advantage-of-email-predictability\/\" target=\"_blank\"><strong>Sedo scammers take advantage of email predictability<\/strong><\/a>&#8220;, I referenced the method that domain hijackers used in the late 90&#8217;s to scoop valuable domain names from under their owner&#8217;s noses; sometimes just to prove a point, other times in order to profit from their act.<\/p>\n<p>That method does not work today, because the implementation of domain locking and the use of authorization keys, has provided the minimum layer of security in order to fend off a particular type of attacks. However, other methods, such as the use of phishing emails and trojans or that of social engineering one&#8217;s way to an account password, still prevail.<\/p>\n<p>Today, I&#8217;m releasing email communication from 2000 &#8211; the single time that I had a domain hijacked, using a security hole that existed in the Network Solutions authentication process.<\/p>\n<p>I have removed the full name of the person who contacted me, and their domain name. As more than a decade has passed, it&#8217;s an interesting insight into the type of frustration domain owners faced back then. TGIF! \ud83d\ude00<\/p>\n<blockquote><p>I just read your article and I&#8217;m just livid! I know exactly how you feel!!!!<\/p>\n<p>My name is Becky R*, the President of United4*.com.<br \/>\nI am just speechless as after days of searching the internet for<br \/>\nothers who&#8217;ve perhaps found themselves in my situation.<\/p>\n<p>Your article relating to Domain Name Hijacking and Network Solutions all read as if I had recited them myself! Unbelievable!<\/p>\n<p>The very same thing happened to me and my company this past<br \/>\nweekend! The perpetrator was able to transfer my domain simply<br \/>\nby &#8220;spoofing&#8221; my email. To make matters worse, Network<br \/>\nSolutions had previously warned us that someone had attempted<br \/>\nto transfer my domain. I replied, &#8220;NO&#8221; to this transfer request.<\/p>\n<p>None-the-less, they sure transferred it alright! What has been most devastating and damaging to me and my company is that after the perpetrators stole my domain, they hosted it on HyperMart and displayed a highly defamatory, malicious and flat out lie about my company! Here is what they had plastered on my stolen domain for 5 days!!!!!<br \/>\n====================<br \/>\n&#8220;This site is currently under investigation by governing internet agencies due to reports of fraud and improper business conducts.<br \/>\nRefunds are available on request by emailing support@clickbank.com.<br \/>\nPlease include your name, email and transaction number when<br \/>\nrequesting a refund.&#8221;<br \/>\n====================<br \/>\nI can&#8217;t begin to tell you how awful and damaging this has been.<\/p>\n<p>This illegal domain transfer took place late this past Friday<br \/>\nnight. When I contacted Network Solutions first thing on<br \/>\nSaturday morning, they told me they couldn&#8217;t do anything and<br \/>\nI&#8217;d have to call back Monday!<\/p>\n<p>Further, it was NOT Network Solutions that shut down the<br \/>\nfraudulent site displaying that damaging message, but<br \/>\nClickbank Security!<\/p>\n<p>It wasn&#8217;t until Wednesday until Network Solutions transferred<br \/>\nmy domain (United4*.com) to me!<\/p>\n<p>I haven&#8217;t been able to get any cooperation from the companies<br \/>\nwho the perpetrator used to transpire this! HyperMart, Hotmail,<br \/>\nMailandNews, etc &#8230;<\/p>\n<p>I had to sent multiple documents in order to prove that I owned<br \/>\nthe domain, etc &#8230;. Then, it turns out that Network Solutions<br \/>\nsaid it happened because someone &#8220;spoofed&#8221; my email.<br \/>\nI asked them what they were going to do about it and they said,<br \/>\n&#8220;nothing&#8221;. I just can&#8217;t believe it.<\/p>\n<p>I requested that they at least send a letter that admonishes my<br \/>\ncompany so that I may make this available to my members,<br \/>\nwho&#8217;ve so many believed we were a scam, etc &#8230; Network<br \/>\nSolutions won&#8217;t even do that for me. People want me to<br \/>\n&#8220;prove&#8221; these terrible things happened they way they did and<br \/>\nI&#8217;m not able to get these people to help me after all of priceless<br \/>\ndamage that occurred because of them!<\/p>\n<p>I have filed a complaint with the IFCC and the FBI, but this<br \/>\ninvestigation could take a long time! Too much time to go<br \/>\nby that these companies whom the perpetrator used will<br \/>\nno longer have logs of his server, etc&#8230;.<\/p>\n<p>I cannot understand how all of these companies can continue<br \/>\nto turn their backs on the individuals and businesses that are<br \/>\nbeing preyed upon!<\/p>\n<p>Thank you so much for your time.<\/p>\n<p>Regards &#8212; you are not alone!<\/p>\n<p>Becky R*<br \/>\nPresident, United4*.com<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been almost five years since I released some information on domain security, as implemented by Network Solutions in the past; those were the days that domain registration was a monopoly. In a post titled &#8220;Sedo scammers take advantage of email predictability&#8220;, I referenced the method that domain hijackers used in the late 90&#8217;s to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3296","post","type-post","status-publish","format-standard","hentry","category-domains","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s been almost five years since I released some information on domain security, as implemented by Network Solutions in the past; those were the days that domain registration was a monopoly. In a post titled &#8220;Sedo scammers take advantage of email predictability&#8220;, I referenced the method that domain hijackers used in the late 90&#8217;s to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Acro.net - A Domain Investing Blog by Theo Develegas\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-07T20:38:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-06-07T20:42:37+00:00\" \/>\n<meta name=\"author\" content=\"Theo Develegas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Theo Develegas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/\"},\"author\":{\"name\":\"Theo Develegas\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/#\\\/schema\\\/person\\\/9c9625f061a0e603a87f5bf0f6f781fe\"},\"headline\":\"Blast from the distant past: Network Solutions and domain security\",\"datePublished\":\"2013-06-07T20:38:14+00:00\",\"dateModified\":\"2013-06-07T20:42:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/\"},\"wordCount\":757,\"commentCount\":0,\"articleSection\":[\"Domains\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/\",\"url\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/\",\"name\":\"Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/#website\"},\"datePublished\":\"2013-06-07T20:38:14+00:00\",\"dateModified\":\"2013-06-07T20:42:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/#\\\/schema\\\/person\\\/9c9625f061a0e603a87f5bf0f6f781fe\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/blast-from-the-distant-past-network-solutions-and-domain-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acro.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blast from the distant past: Network Solutions and domain security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/acro.net\\\/blog\\\/\",\"name\":\"Acro.net - A Domain Investing Blog by Theo Develegas\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acro.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acro.net\\\/blog\\\/#\\\/schema\\\/person\\\/9c9625f061a0e603a87f5bf0f6f781fe\",\"name\":\"Theo Develegas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g\",\"caption\":\"Theo Develegas\"},\"description\":\"Theo Develegas - News and opinions on domain name investing, brand development, design, and the occasional rant or two about life's challenges. Founder of Acroplex LLC.\",\"sameAs\":[\"https:\\\/\\\/acro.net\",\"https:\\\/\\\/x.com\\\/acroplex\"],\"url\":\"https:\\\/\\\/acro.net\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/","og_locale":"en_US","og_type":"article","og_title":"Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas","og_description":"It&#8217;s been almost five years since I released some information on domain security, as implemented by Network Solutions in the past; those were the days that domain registration was a monopoly. In a post titled &#8220;Sedo scammers take advantage of email predictability&#8220;, I referenced the method that domain hijackers used in the late 90&#8217;s to [&hellip;]","og_url":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/","og_site_name":"Acro.net - A Domain Investing Blog by Theo Develegas","article_published_time":"2013-06-07T20:38:14+00:00","article_modified_time":"2013-06-07T20:42:37+00:00","author":"Theo Develegas","twitter_misc":{"Written by":"Theo Develegas","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/#article","isPartOf":{"@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/"},"author":{"name":"Theo Develegas","@id":"https:\/\/acro.net\/blog\/#\/schema\/person\/9c9625f061a0e603a87f5bf0f6f781fe"},"headline":"Blast from the distant past: Network Solutions and domain security","datePublished":"2013-06-07T20:38:14+00:00","dateModified":"2013-06-07T20:42:37+00:00","mainEntityOfPage":{"@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/"},"wordCount":757,"commentCount":0,"articleSection":["Domains"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/","url":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/","name":"Blast from the distant past: Network Solutions and domain security - Acro.net - A Domain Investing Blog by Theo Develegas","isPartOf":{"@id":"https:\/\/acro.net\/blog\/#website"},"datePublished":"2013-06-07T20:38:14+00:00","dateModified":"2013-06-07T20:42:37+00:00","author":{"@id":"https:\/\/acro.net\/blog\/#\/schema\/person\/9c9625f061a0e603a87f5bf0f6f781fe"},"breadcrumb":{"@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/acro.net\/blog\/blast-from-the-distant-past-network-solutions-and-domain-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acro.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Blast from the distant past: Network Solutions and domain security"}]},{"@type":"WebSite","@id":"https:\/\/acro.net\/blog\/#website","url":"https:\/\/acro.net\/blog\/","name":"Acro.net - A Domain Investing Blog by Theo Develegas","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acro.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/acro.net\/blog\/#\/schema\/person\/9c9625f061a0e603a87f5bf0f6f781fe","name":"Theo Develegas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6794630c371bee89f2b833c1f4b777d9ba75767b217c8fce2cfd6e6d7d90960d?s=96&d=mm&r=g","caption":"Theo Develegas"},"description":"Theo Develegas - News and opinions on domain name investing, brand development, design, and the occasional rant or two about life's challenges. Founder of Acroplex LLC.","sameAs":["https:\/\/acro.net","https:\/\/x.com\/acroplex"],"url":"https:\/\/acro.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/posts\/3296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/comments?post=3296"}],"version-history":[{"count":0,"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/posts\/3296\/revisions"}],"wp:attachment":[{"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/media?parent=3296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/categories?post=3296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acro.net\/blog\/wp-json\/wp\/v2\/tags?post=3296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}