ICANN ICANN Email List Archives

[gnso-irtpd]


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [gnso-irtpd] Example email string

  • To: "Dorrain, Kristine" <kdorrain@xxxxxxxxxxxx>, "'rob.golding@xxxxxxxxxxxx'" <rob.golding@xxxxxxxxxxxx>, "gnso-irtpd@xxxxxxxxx" <gnso-irtpd@xxxxxxxxx>
  • Subject: Re: [gnso-irtpd] Example email string
  • From: Volker Greimann <vgreimann@xxxxxxxxxxxxxxx>
  • Date: Thu, 06 Feb 2014 16:44:53 +0100


Hi Kristine,

the FOA can be obtained in various ways, but the most common one is an email sent to the registrant or admin email address containing a trigger that must be responded to in some fashion. So the transfer would have to be authorized by someone controlling the email account of the registrant.

So in order to effectuate a fraudulent transfer the hacker would either have to have access to the email account of the registrant, or to have changed the email address in the whois prior to the transfer, an action that will be made much more difficult once ITRP-C is implemented.

Best,

Volker
I can appreciate the concern here.  I'm not a registrar, so I don't understand the nuances of transfer, but I 
do understand an FOA is needed.  What if (and I don't know in this case, I'm talking generally), the FOA was 
fraudulent and the registrar "didn't suspect" fraud. I use quotes because I am asking (honestly, 
not rhetorically) what prevents a registrar from simply "not noticing" fraud?  Does a registrar do 
any sort of validity check or "well, the request came from an authorized email account so who am I to 
ask questions"?

Is there anything currently being done to encourage or train Registrars to spot 
fraudulent transfer requests?

Sorry if my questions are very  basic...

-----Original Message-----
From: owner-gnso-irtpd@xxxxxxxxx [mailto:owner-gnso-irtpd@xxxxxxxxx] On Behalf 
Of rob.golding@xxxxxxxxxxxx
Sent: Thursday, February 06, 2014 9:23 AM
To: gnso-irtpd@xxxxxxxxx
Subject: RE: [gnso-irtpd] Example email string


But this type of issue is exactly the one Registrants are seeking a
remedy for within ICANN.
The 'claim' is that the transfer (validly completed) was 'fraudulent'
because they allowed their details to be exploited/phished/socially engineered 
or whatever - that's going to need someone to investigate/prove/identify the 
details of the hack/exploit/scam.

Ideally that's a job for the courts and specialists, not ICANN, not a Registrar 
etc (in many cases) - a *crime* has been committed - we're not 'judges' or 
qualified to make decisions about that.

I hear the 'I've been hacked' story 100 times a week - usually after 
terminating a spammers services.

One of the funniest was Monday someone claiming they never ordered something, 
and that we're been 'illegally taking money' from their bank account - 
obviously they must have been 'hacked' (and accused us of doing it)

This is after the order came from their IP, it was paid (and 3d-secured at 
their bank) on their Debit card, they'd raised 3 support tickets/questions in 
the preceding month, we'd spoken to them by phone at least once ...

'I must have been hacked' translates into 'oh sh!t I forgot to cancel something 
I dont think I want anymore and rather than being reasonable and asking the 
company for a refund that they probably would have given without issue, I tried 
to fvck them over with bullcrap claims'

As to the email-chain that started the thread, who is to determine they didnt 
sell the domains and now have buyers-remorse ? Or had their assets seized by 
the FBI ? or a million other possibilities ...

I disagree with the position that a party using illegally obtained
credentials
I'm merely saying the *correct* credentials were used - if there is a claim 
that the obtaining of those is 'illegal' then go seek 'legal'
counsel.

Rob


--
Bei weiteren Fragen stehen wir Ihnen gerne zur Verfügung.

Mit freundlichen Grüßen,

Volker A. Greimann
- Rechtsabteilung -

Key-Systems GmbH
Im Oberen Werk 1
66386 St. Ingbert
Tel.: +49 (0) 6894 - 9396 901
Fax.: +49 (0) 6894 - 9396 851
Email: vgreimann@xxxxxxxxxxxxxxx

Web: www.key-systems.net / www.RRPproxy.net
www.domaindiscount24.com / www.BrandShelter.com

Folgen Sie uns bei Twitter oder werden Sie unser Fan bei Facebook:
www.facebook.com/KeySystems
www.twitter.com/key_systems

Geschäftsführer: Alexander Siffrin
Handelsregister Nr.: HR B 18835 - Saarbruecken
Umsatzsteuer ID.: DE211006534

Member of the KEYDRIVE GROUP
www.keydrive.lu

Der Inhalt dieser Nachricht ist vertraulich und nur für den angegebenen 
Empfänger bestimmt. Jede Form der Kenntnisgabe, Veröffentlichung oder 
Weitergabe an Dritte durch den Empfänger ist unzulässig. Sollte diese Nachricht 
nicht für Sie bestimmt sein, so bitten wir Sie, sich mit uns per E-Mail oder 
telefonisch in Verbindung zu setzen.

--------------------------------------------

Should you have any further questions, please do not hesitate to contact us.

Best regards,

Volker A. Greimann
- legal department -

Key-Systems GmbH
Im Oberen Werk 1
66386 St. Ingbert
Tel.: +49 (0) 6894 - 9396 901
Fax.: +49 (0) 6894 - 9396 851
Email: vgreimann@xxxxxxxxxxxxxxx

Web: www.key-systems.net / www.RRPproxy.net
www.domaindiscount24.com / www.BrandShelter.com

Follow us on Twitter or join our fan community on Facebook and stay updated:
www.facebook.com/KeySystems
www.twitter.com/key_systems

CEO: Alexander Siffrin
Registration No.: HR B 18835 - Saarbruecken
V.A.T. ID.: DE211006534

Member of the KEYDRIVE GROUP
www.keydrive.lu

This e-mail and its attachments is intended only for the person to whom it is 
addressed. Furthermore it is not permitted to publish any content of this 
email. You must not use, disclose, copy, print or rely on this e-mail. If an 
addressing or transmission error has misdirected this e-mail, kindly notify the 
author by replying to this e-mail or contacting us by telephone.






<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy