wrongful taking of control of a domain name from the rightful name holder.” The present contribution describes the types of domain thefts (Section 2) and explains the possibilities for recovery of stolen domain names (Section 3). The Domain Hijacking report differentiates five basic types of domain theft, namely: impersonation of a domain name registrant in correspondence with a domain name registrar (Subsection 2.1); forgery of a registrant’s account information maintained by a registrar (Subsection 2.2), forgery of a transfer authorization communication from a registrant to a registrar (Subsection 2.3); impersonation or a fraudulent act that leads to the unauthorized transfer of a domain from a rightful name holder to another party (Subsection 2.4), and unauthorized DNS configuration changes that disrupt or damage services operated under a domain name (Subsection 2.5).
Sext Adventure was selected to be a part of Indie Cade!
Sext Adventure was at Boston Festival of Indie Games this past September with a special peep show booth!
Both domain names were previously registered and managed by Go Daddy Operating Company, LLC.
Suddenly, an unidentified and unauthorized person used the name and the password of the company manager to log into his account and transfer the Domain names to another Registrant and Registrar (Online NIC, Inc.).
In this case, the motive of the thief is not to immediately disrupt the domain holder’s operation, but to acquire and resell the domain name.
An example of such a theft is the blogtemplate4and incident.
This is a plot element in Bruce Sterling's brilliant "RU486?
" a short story collected in Globalhead -- feminist hackers finance their RU486-running operation with a phone-sex line staffed by automated chatterbots.
2.4 Impersonation or a fraudulent act that leads to the unauthorized transfer of a domain name from a rightful name holder to another party This type of domain name theft includes actions that may or not may lead to changes in the DNS configuration.
If the theft does not lead to changes in the DNS configuration, it could remain undetected for a considerable period of time.
Unauthorized DNS configuration changes can be a result of DNS spoofing attacks (also known as DNS cache poisoning).