"Craig Box"
30/09/2005 08:52 >>> Just got a phish for BankDirect. The telling part: "
Anyone know what the rights of the Registrar are in this case? Are
discountdomains able to just undelegate the domain from the zone? It would
solve all the problems within 60 mins. Or is that kind of action only at the
DNC's discretion?
Mark.
-----Original Message-----
From: Webmaster [mailto:Webmaster(a)radionz.co.nz]
Sent: Friday, 30 September 2005 9:05 a.m.
To: nznog(a)list.waikato.ac.nz
Subject: Re: [nznog] Bankdirect phish
It has just occured to me that a good way to 'deal' with phishing sites
prior to them being shut down might be to have a script that submits
random usernames and passwords. Thousands of them.
It would certainly make it much harder for the phisher.
cheers,
Richard
href="http://www.bankdlrect.co.nz/index_secure.asp" >" - notice the
'l'
where the I should be. Hopefully as this is inside .nz DNS we can get
this one shut down quickly.
The domain is registered with DiscountDomains.co.nz to a RODNEY
GUISTWITE.
admin_contact_name: RODNEY GUISTWITE
admin_contact_address1: 9740 CONIFER LANE
admin_contact_city: MURRELLS INLET
admin_contact_country: US (UNITED STATES)
admin_contact_phone: +84 3 6501641
admin_contact_email: directmain(a)yahoo.com
The email headers:
Received: from firewall.itpartners.co.nz ([10.7.0.254]) by
penfold.itpartners.co.nz with Microsoft SMTPSVC(6.0.3790.1830);
Fri, 30 Sep 2005 08:46:23 +1200
Received: from [218.233.125.18] (helo=-1208382648)
by firewall.itpartners.co.nz with smtp (Exim 4.34)
id 1EL5Iv-0007GJ-5u
for craig(a)itpartners.co.nz; Fri, 30 Sep 2005 08:47:04 +1200
Received: from bankdirect.co.nz (-1208528168 [-1208791160])
by google.com (Qmailv1) with ESMTP id 554E5D0054
for