- Joined
- Apr 15, 2002
- Messages
- 5,755
- Reaction score
- 63
Here is part of the email:
----------------
Registerfly.com <[email protected]> to (me). STANDARDIZED FORM OF AUTHORIZATION. DOMAIN NAME TRANSFER - Initial Authorization for Registrar Transfer. Re: Transfer. eNom, Inc. has received a request from (MY PERSONAL NAME WAS HERE), (MY REGISTRANT FIRM NAME WAS HERE) on 14 Mar 2005 for us to become the new registrar of record......
-----------------
What is amazing here is that this latest attempt to steal a name is quite unique in that from what it appears the thief had actually opened a new acct at RegisterFly (eNom resller?) under my exact personal name and business name.
Can only guess that he was hoping since the name seemed to be going into an acct under my exact same identity that it must have been a transfer I initiated and was hoping I would think I simply forgot about it so would approve the transfer request.
Another possibility is he was under the impression it would automatically transfer after 5 days and since it seemed to be going into the same registrants acct that no one would pay any attention to it being fraud, or perhaps it would not be investigated too.
I have never tried to transfer this name anywhere, never offered it for sale, and do not have an acct at Regiserfly and never had an acct there under my personal name or business name so this being anything other than fraud is highly unlikely.
Perhaps by coincidence I purchased this name here at DNF from a member about a month ago and at the time it was not registered with enom or registerfly. At that time it was successfully pushed to my GoDaddy acct without any delay or problem. Tried calling Registerfly support about this but gave up after many calls and lots of wasted time spent on hold.
Watch out for this as it appears to be the latest and possibly best way to steal your domains. Of course, anyone can open an acct under any name they wish. All this thief seems too have done is open a new registrar account using the exact same Whois data he found on the domain he was trying to steal. I am sure the major difference is he substituted his own email address, likely a free email acct address.
Watch out for this and please report any instances of this happening to you as it easly could be wide spread.
----------------
Registerfly.com <[email protected]> to (me). STANDARDIZED FORM OF AUTHORIZATION. DOMAIN NAME TRANSFER - Initial Authorization for Registrar Transfer. Re: Transfer. eNom, Inc. has received a request from (MY PERSONAL NAME WAS HERE), (MY REGISTRANT FIRM NAME WAS HERE) on 14 Mar 2005 for us to become the new registrar of record......
-----------------
What is amazing here is that this latest attempt to steal a name is quite unique in that from what it appears the thief had actually opened a new acct at RegisterFly (eNom resller?) under my exact personal name and business name.
Can only guess that he was hoping since the name seemed to be going into an acct under my exact same identity that it must have been a transfer I initiated and was hoping I would think I simply forgot about it so would approve the transfer request.
Another possibility is he was under the impression it would automatically transfer after 5 days and since it seemed to be going into the same registrants acct that no one would pay any attention to it being fraud, or perhaps it would not be investigated too.
I have never tried to transfer this name anywhere, never offered it for sale, and do not have an acct at Regiserfly and never had an acct there under my personal name or business name so this being anything other than fraud is highly unlikely.
Perhaps by coincidence I purchased this name here at DNF from a member about a month ago and at the time it was not registered with enom or registerfly. At that time it was successfully pushed to my GoDaddy acct without any delay or problem. Tried calling Registerfly support about this but gave up after many calls and lots of wasted time spent on hold.
Watch out for this as it appears to be the latest and possibly best way to steal your domains. Of course, anyone can open an acct under any name they wish. All this thief seems too have done is open a new registrar account using the exact same Whois data he found on the domain he was trying to steal. I am sure the major difference is he substituted his own email address, likely a free email acct address.
Watch out for this and please report any instances of this happening to you as it easly could be wide spread.