![]() |
Moniker fake suspension notice (phish?)
Received this for a few of my domains. At first glance it actually looks quite legit. Note that it includes the domain name and also the registrar. A fair bit more sophisticated than the usual "your (bank you don't actually use) login is invalid" phish.
The link includes the victim domain in the URL. I haven't clicked through to see what happens. ========== Dear Sir/Madam, The following domain names have been suspended for violation of the Moniker Online Services LLC Abuse Policy: Domain Name: <my domain> Registrar: Moniker Online Services LLC Registrant Name: Moniker Privacy Services Multiple warnings were sent by Moniker Online Services LLC Spam and Abuse Department to give you an opportunity to address the complaints we have received. We did not receive a reply from you to these email warnings so we then attempted to contact you via telephone. We had no choice but to suspend your domain name when you did not respond to our attempts to contact you. Click here and download a copy of complaints we have received. Please contact us for additional information regarding this notification. Sincerely, Moniker Online Services LLC Spam and Abuse Department Abuse Department Hotline: 480-846-1648 |
its a huge phishing campaign. i've gotten hundreds of them.
|
By the way, Moniker has pulled this sort of shit before - threats of suspension etc - which is another reason I initially thought it was legit.
|
Where did I set that timeline graphic.....
|
There has been a bunch of domain phishing attempts flying around in the last month or so. I have had several, seemly from several different domain companies. Just staying sharp on the URLs and contact info in the emails, compared to the real companies, will keep you safe.
. |
Quote:
|
Quote:
However, that's also another reason why you should consider TFA (Two Factor Authentication). The idea of TFA is to incorporate (a) something you know ie a password with (b) something you have ie a mobile phone or token or something else. Therefore someone with your username and password alone is not going to get into your account. It's a standard feature at Namecheap (free of charge) but they also have a lot of other security features that would defeat phishing and other similar kinds of malady. For example, you are able to disable the "Forgot Password" options which means that if someone gains access to your email they also will not be able to send the login details to your email address. |
Quote:
Better to have a few threads than not have it noticed at all. :) |
|
|
This isn't just Moniker. This scam is making the rounds through all the registrars. I've been getting them from eNom for two weeks now. They don't appear to have hit Go Daddy yet but I'm sure that will be cycling through pretty soon.
|
Mine were from ENOM etc
Hover over the link in the email and it links to some shady looking url, you can see from that, how shady this is. |
I've got these in the mail before
|
Quote:
|
Quote:
|
Quote:
|
Quote:
Quote:
|
this has been going on for a week or more :2 cents::2 cents::2 cents:
|
Quote:
|
Quote:
Quote:
Then again.... I guess people who fall for phishing aren't going to know or care about IP based security. Or 2FA, for that matter. |
Quote:
So if I know with a high degree of certainty that I will never access from say China or Pakistan, I should be able to exclude access from any IP originating from CN, PK or any given set of countries. Of course, hackers can hide it but I guess it all helps. Quote:
Quote:
|
Quote:
So it goes like this... 1) First 2FA value is captured by phish site, and passed through. At this point if login was to succeed they would have control of your account. 2) Registrar sees unknown & geographically disparate IP (the phish site) logging into that account, sends SMS to client with further instructions to further verify the login. 3) SMS warns of possible breach and advises client to load registrar site directly in order to complete login, which may then require them to change password, or confirm that the new IP on the other side of the world is actually legit. |
I have my domains at Fabulous and I have been getting those too.
One way to catch those are that they are sent to the domainprivacy email. Fabulous always communicate with me on my real email, via a forwarding email address, which is of course unique and only used for just Fabulous. It contains letters and numbers in a certain order, only Fabulous knows about this email to even exist and it would be highly unlikely for anyone else to guess the email. Thereby, once I receive an email addressed to that forwarding address, then I can quite safely assume it is real and everything else gets ignored. But I found the same emails in my Gmail spam box, with the domain http:// shakilkumar . com/abuse_report . php?domain.com You can remove the ?domain.com and see, it will try to download a .pdf.scr file. Pretending to be the complaint in PDF format but in reality an executable .scr file. Of course I didn't download the file nor did I enter my own domain after the question mark. |
Quote:
Since I am using it as soon as I am receiving it, the 2FA is of no use to the phisher who has no way to obtain a new one because he doesn't own my phone. I think technically its possible but difficult for a phish site to use a 2FA. |
Quote:
If you're logging in via the phish site, which then relays your username, password and a valid 2FA token to the registrar, they control your session. There is only the 2FA challenge once, at login; every subsequent load will present some sort of session identifier, in the URL, or a cookie. Since you're going via the phish site, they can capture that session identifier, and now they own your session. Then it's as simple as printing a "we were wrong, apologies for the inconvenience," with a fake logout button, to make the user go away (remember they're responding to a notice about their domain, not just routinely logging in to do something else.) Phish site still owns the active session and can do anything with your account that does not require another 2FA challenge. |
Quote:
So if the domain site detects login from unusual IP location, that gets flagged and prompts domain site to force a second 2FA request and require a second verification via logging in through browser rather than email link. Is this what you are saying? I do think it addresses something which people should be strongly advised against doing anyway which is logging into their account via email link. It needs work but its a good idea - I will also suggest this one. |
All times are GMT -7. The time now is 03:52 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc