[[brb, compromised|Back to '''brb, compromised]]
http://beta.glexia.com/suspended.page/" class="text-indigo-600 dark:text-indigo-400 hover:underline" target="_blank" rel="noopener noreferrer">updates" class="max-w-full h-auto rounded-lg shadow-md" style="" loading="lazy" onerror="this.onerror=null; this.src='/images/missing.png'; this.alt='Image not found: News.4chan.jpg';">With me so far? Good. http://4chanstatus.blogspot.com/" class="text-indigo-600 dark:text-indigo-400 hover:underline" target="_blank" rel="noopener noreferrer">As the 4chan status blog notes, Moot's account with the registrar has been compromised (in this case, [[FAIL|Network Solutions]]). This means he no longer has control over the domain registration, and in turn has no power over the domain's DNS or web services.
This isn't as juvenile as getting into the webserver and putting a picture of Goatse on the front page; these people hijacked 4chan like someone hijacks a plane. They're in direct control of it, and Moot's helplessly along for the ride unless he can get back into the account. (Given his choice of registrars, though, 4chan is going to be down for a few days at the least.)
When they took over Moot's account at NetSol, they changed the nameserver delegation, which means they changed the DNS duties from 4chan's nameservers over to their own. Right now, visitors to 4chan aren't getting answers about the domain from Moot, they're getting the answers from the failfags.
Here's the response from 4chan's actual nameservers:
~$ dig 4chan.org @206.220.140.2;; QUESTION SECTION:
;www.4chan.org. IN A;; ANSWER SECTION:
www.4chan.org. 86400 IN CNAME 4chan.org.
4chan.org. 86400 IN A 66.207.165.166;; AUTHORITY SECTION:
4chan.org. 86400 IN NS ns1.4chan.org.
4chan.org. 86400 IN NS ns2.4chan.org.
4chan.org. 86400 IN NS ns3.4chan.org.
Here's what it currently looks like after the hijacking:
If you hire an IT guy to "make me a web domain on the internets", you need to make sure that your own personal addresses are listed as the contacts for the domain, and that you have full control over the registration, DNS provision, and web services, and that your own personal credit cards have been used to purchase and pay for all of these, even if you need to reimburse yourself through the company. If a problem ever occurs and you fire that IT guy, he won't be able to dangle your domain over your head as a bargaining chip.
[[tl%3Bdr]] Don't make the same mistakes Moot did! Be diligent in keeping track of this information or someone will steal it from you! Don't use a cheap bulk registrar like NetSol because you're going to get the security and help you pay for! DESU IS NOT A SECURE PASSWORD!
Hello Jason/ All,
We have advised you many times in regards to this issue. The domain was never renewed and you allowed
it to expire past the grace period. As it was not renewed it was taking up by the registry. We have
asked you several times if you felt it was an error in the expiration to foward us the receipt you
received for the renewal of the domain which you have failed to provide. The charge you are attaching
in this email was for the actual "Purchase" of the domain that was listed by another client of ours in
our marketplace. This is a private sale and is only that, a sale. It had nothing to do with the
actual renewal of the domain. So Please, lets get the facts straight.Regards,
Michael K.
[[Category:Internets Phenomena]]
[[Category:Chans]]