![]() |
SleazyDream Hi Jacker strikes again!
This is mainly a warning to everyone.
I just had one of my domains stolen by the same person who recently stole one of SleazyDreams domains. The perp Xyberotica.com. The domain was also transfered to the same registrer DirectI.com Fortuantely the DNS servers have not been changed and I may be able to scrap through this and get the domain back into my position before any major damage is done. Would rather not say the domain incase the person is reading and attempts to change the DNS info. I would suggest doing a whois on your domain names and making sure that all the contact information is correct. I only noticed because I was lucky enough to whois my name today. I have contacted all major parties involved and hopefully with some luck I can get my name back ASAP. I also want to publicly thank GeorgeK for taking my call, helping and pointing me in the right direction to get this resolved. |
Intresting and good advice...bump this yo
|
who was your domain registered with?
|
Quote:
|
prolly DirectNic also
|
Thats some crazy shit
|
so whats up with directnic?
|
I was selling some domains from them recently. So my account may have been on normal security and not register lock for a period of time.
I don't put any blame on Directnic if anyone should get the blame it should be ICANN and people that like to steal. I probably wont get any news until Monday. I will keep everyone up to speed as I get information. If you haven't already check your domains and lock them down like fort knox. |
was it locked or unlocked
|
Quote:
Did you recieve a tranfer email to the email on file.. ?? Its important to others to know |
god i wonder how much $ this guy is making.
no more mention of domain names here. seems dude is harvesting from here. |
Quote:
No i think he is tracking them down using a traffic trade script Most of the previous adult domains were tgps . And yes he is making lots , i took a look at his stats last time and he was making over a grand a day |
As Muff said, make sure you have your domains locked NOW. I notice Adult.com and some of the other prime names that used to be unlocked are now locked --- everyone else needs to do the same.
Folks might want to take a moment to complain to ICANN regarding the new transfer policies. See: http://www.icann.org/announcements/a...nt-12jan05.htm |
Quote:
|
All my domains @ Godaddy were auto-locked...wonder if it has anything to do with this highjacks...
|
Ambush Inteviews = Fucking Gay
|
I don't want to educate the thieves by elaborating too much. But, basically relying upon the GAINING registrar, a party you have no existing contract with whatsoever, to authenticate a transfer is a stupid idea. The old system of double-authentication (where the existing registrar also had to autheticate) was safer.
The "meat" of ICANN's new policy was the requirement that registrars provide an easy to use unlock mechanism (some registrars like Totalnic were infamous for making it nearly impossible to unlock your own domains). Then, ICANN went too far, in my opinion, in reducing security by making transfers too easy. Yes, too easy for legit transfers, but also too easy for rogue transfers. |
Any one want a nice little programming idea.
Make a app that monitors the whois on a list of domains. It can email your or page your cell phone if anything changes on your whois info. Would be a nice little program to have with all this stuff going on latetely. |
Quote:
I hope some answers arrive here soon, I have always trusted directnic |
DarkJedi had a domain name jacked from Directnic last night, too.
|
Quote:
|
This is becoming an epidemic... Hopefully he posts some information in this thread that can help protect people. Also sending an email to the link George posted http://www.icann.org/announcements/...ent-12jan05.htm may eventually get ICANN to re-think their decision to loosen the transfer policies
|
What i want to know is HOW THE FUCK IS THE HIJACKERS WEBSITE STILL UP ??
Advertising amateurpages also still ? and btw heres the icq numbers of the company hosting this assholes spyware 113165 10023615 10244455 106254172 |
heres a small few of the domains these hackers have stolen recently
china.net, distribute.com, energy.com, f3.com, k4.com, phone.com, radioactive.com, ricochet.com, shanghai.net, size.com, software.com, web.net |
If you're a domain buyer (like I am), all these thefts means you have to be very careful in buying expensive domains, lest you end up with a stolen one which can be recovered by the rightful owner at a future date, leaving you holding the bag. That means using:
1) telephone verification (most hijackers won't get on the phone with you) 2) written contracts 3) Historical WHOIS verification (get a silver membership at www.whois.sc -- it pays for itself fast). If you see too many WHOIS changes recently, that should raise alarm bells. Try to call prior owners (before the existing registrant) to see if they had really sold the domain to the current owner. |
wtf this shit is too fucking much
one of the registrars involved in the hijackings is qnic.com Originally when this started i looked at the site and it was like an affiliate program ( or more like a toolbar program ) that you could simply open an account add any domain you wanted and they would try to transfer it over , and pay you for how many toolbars you installed. Shortly after sleazy got his domain stolen i looked again , and the now it looks like a regular registrar again * actually i tried in between that and they were just hooking up the new interface * So in looking up some info on these scammers i notice this as the address. 501 Silverside Road suit 105 Wilmington, DE 19809 After doing a google search i find they are quite a few different companies http://www.kingtutshop.com/Khome/payment.htm Egypt Cyber Trade, LLC 501 Silverside Road, Suite 105 Wilmington, DE 19809 USA Fax: +1 800 517 9256 The check should be payable to: Egypt Cyber Trade, LLC - Account # 0191012202 - ABA Number: 031101114 And another company / registrar http://www.albanianyellowpages.com/c...org.pl?id=1060 MainNic mission is to provide low cost and secure domain name registration services. Category: Internet Product & Service Providers Established in 2003 Address: 501 Silverside Road, Suite 105 City: Wilmington State: De Zip Code: 19809 Country: United States Phone Number: 202-742-2403 Fax Number: 206-984-2797 ID Number: 1060 Created On: 2004-09-17 Last Updated: 2004-09-17 gee and and another http://www.aspwebserver.com/about.asp and another ( a muslim company ) ? http://www.eJilbab.com Quality & Modest Islamic fashion (Jilbabs, Abayas, & Dishdashs) manufactured by eJilbab for the contemporary Muslim woman with affordable prices. Address: 501 Silverside Road, suite 105 ----- City: Wilmington Phone : 18882597454 State: Deleware Fax : 13023972109 Country: United States Mobile : ----- Post Code: 19809 Toll- Free : 18882597454 and another Contact Us If you have any queries about courseGenie please get in touch with: US Contact: James Cupit US Sales Manager CourseGenie, LLC 501 Silverside Road Suite 105 Wilmington DE 19809 Tel: 1-888 433 9006 Fax: 1-888 433 9007 Email: [email protected] why do they all have the same address ? |
ok wtf even stranger all those sites are basically owned by the same guy yet they have almost nothing in common..
something is very very strange, same address's multiple companies , they all boil down to the same people. |
This shit is way too fucked up . ok cliff notes..
Most of the hijacked domains were stolen using a registrar www.qnic.com ( they seem to be part of the hijacks themselves ) Upon looking up there address leads me to hundreds of other websites with no correlation to qnic , but they all use contact info in WILIMINGTON the same office/drop box.. Ok so maybe its just a drop box , but looking up the whois on each of these domains , all lead in one way or another to lynden washington .. same address again. I hate to say just because of the muslim ties this seems like a terrorist organization but wtf ?? Maybe someone can point out where i fell into the deep end ? |
Definately something fishy going on with those companies smokey. Searching for more information now.
|
Damn good work Smokie. :thumbsup Wilmington, De is not far from me. I'm going to save his address for future ref.... :BangBang:
|
Someone needs to get smacked the fuck up
|
Given the PATRIOT act is making it harder for terrorists to move/launder money, it would not surprise me at all if terrorists would try to fund themselves through internet crime. Instead of moving money from Iraq to the USA, they could generate it onshore via webmaster programs, debit cards/Paypal, etc.
|
When I traced xybererotic.com earlier I found the final hops ending in kuwait beleive it or not. Maybe I was seeing things but I am pretty positive. Now I get timeouts for the last hops past Level3.
|
www.imhosted.com same address
|
Quote:
|
ok now im running into alot more stories of hijacks from some of the same companies using that contact info..
LMhosted and IMhosted.com both seem to be culprits |
ok i tracked them down ,, all the companies listed are registered by a canadian company that registers foreign business with american address so they cant be traced..
www.valisgroupinc.com |
hmm they are also frauds fuck , i think this has to be some sort of big moneylaundering scheme or just plain thefts or terrorists or something ?
|
Quote:
|
If you find and fraud that points to the lynden washington location report to Lynden Washington police www.lyndenwa.org c/o Detective Lee Beld at [email protected]
|
All times are GMT -7. The time now is 03:15 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123