Hijackers: Like Kids in a Candy Store.
How can the hijackers do this? They can do it because changing ownership of a domain name is very simple. To illustrate their scheme, let's first look at what it takes to establish ownership of a domain name.
To register a name , you give a domain registrar your credit card number and contact information, such as your name, physical address, e-mail address, and telephone number. Then you invent a password for your domain name account. From then on, you can gain access to your account and change your contact information by logging on to the registrar's site using the password.
But under Network Solutions' commonly used "MAIL-FROM" security setting for domain accounts, name holders can also request changes to their account by sending Network Solutions an e-mail message.
It's this latter option that the cyberthieves are easily exploiting. To steal your name, they simply look up your contact information on BetterWhois.com, a public database that allows anybody to find out who owns a domain name. Then they fake your identity by using your e-mail address with the MAIL-FROM designation.
The crooks send an e-mail message, instructing the registrar to change the contact and server information on the account to whatever new contact and server they specify. With the MAIL-FROM security level, it doesn't matter what the routing information is on this e-mail, as long as the message has your e-mail address in the "From" field. That's how the thieves were able to easily impersonate Warren Sly, director of DomainCaddy and owner of trades.com, and steal his domain name.
Outraged victim domain owners then receive a message from Network Solutions about 30 days after the thieves fake their e-mail addresses, notifying them of the "successful completion of the administrative changes" they didn't even request.
http://www.workz.com/cgi-bin/gt/tpl_page.html,template=1&content=1108&nav1=1&