- Impact
- 6,143
Tobacco.com is currently a stolen domain asset, after a double transfer from Network Solutions to GoDaddy and then Ionos.
More information.
More information.
I would not recommend users use their personal emails to secure their registrar accounts. You should make a new + fresh email with a new, difficult password. Highly recommended to put 2FA on email and registrar account.Most if not all generic emails have been involved in such a breach. It's not safe to use ISP email accounts to manage domains.
Sure, there are many scenarios.The only way to protect yourself against social engineering hacks is to use a registrar email that you have full control of and that isn't on any public WHOIS record. In order to gain access to that email, they would need to a) know it and b) do an hack onto a server, and that's not what happens, as 99.9999999% of these intrusions are scammers calling up a business and pretending to be you.
All this 2FA is only as good as the CSR on the other end, because the scammers will call from some hacker mill with "Me Joe Smith, me lost passwords" and at that point, all this 2FA is junk because the CSR will often go to "the script" to "help his customer" and start asking basic crap like for addresses, DOB, phone numbers, account numbers, etc., which is all info freely available on the dark web.
Bye bye 2FA.
Better have 2FA on than not.
Don't get me wrong I agree with you, it happens all the time.Sure, it's like putting an extra lock on the door, but it doesn't make the door itself any more secure to intrusion.
Most CSRs are giving away accounts like candy, and it even happened at GD not long ago, where a support guy was fooled by social engineering and a lot of domains transferred out.
Fingers crossed the rightful owner gets it back, they should be able to right?
You can't really prevent them if your info is already out there (WHOIS info)
GoDaddy's plan to Remove Public Whois Information in early June sounds logical after all.
I did not know they were planning for this. That is great to hear.GoDaddy's plan to Remove Public Whois Information in early June sounds logical after all
.
The only way to protect yourself against social engineering hacks is to use a registrar email that you have full control of and that isn't on any public WHOIS record. In order to gain access to that email, they would need to a) know it and b) do an hack onto a server, and that's not what happens, as 99.9999999% of these intrusions are scammers calling up a business and pretending to be you.
All this 2FA is only as good as the CSR on the other end, because the scammers will call from some hacker mill with "Me Joe Smith, me lost passwords" and at that point, all this 2FA is junk because the CSR will often go to "the script" to "help his customer" and start asking basic crap like for addresses, DOB, phone numbers, account numbers, etc., which is all info freely available on the dark web.
Remember, these CSRs are in the CUSTOMER SERVICE business, not the security business, and if the scammer bought the right info, it's bye bye 2FA.
Shouldn't the response to "Me Joe Smith, me lost passwords" be "Fine, we will email you a link to reset your password"?