Unstoppable Domains โ€” Expired Auctions

alert Epik Had A Major Breach

SpaceshipSpaceship
Watch

DaveX

@GoDaveXTop Member
Impact
52,011
Last edited:
36
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
GoDaddyGoDaddy
Isn't this something that many registrars do? That "save your credit card for easier future transactions"? Good thing I don't use Porkbun anymore, they force you to to have at least 1 saved and if removal is wanted, you have to contact them. Aren't almost all registrars considered as violators of this rule?

No online platform that takes card payments serious stores it locally. At Dan for example, we store zero card information in our own database. We pass the information to Adyen and they store it as they are the experts in keeping that data safe. So having your card information stored somewhere isn't the problem but how and by whom it's stored is important to know.
 
22
•••
https://stripe.com/gb/guides/pci-compliance


Overview of PCI Data Security Standard (PCI DSS)
PCI DSS is the global security standard for all entities that store, process or transmit cardholder data and/or sensitive authentication data. PCI DSS sets a baseline level of protection for consumers and helps reduce fraud and data breaches across the entire payment ecosystem. It is applicable to any organisation that accepts or processes payment cards.

PCI DSS compliance involves 3 main things:

  1. Handling the ingress of credit card data from customers, namely, that sensitive card details are collected and transmitted securely
  2. Storing data securely, which is outlined in the 12 security domains of the PCI standard, such as encryption, ongoing monitoring, and security testing of access to card data
  3. Validating annually that the required security controls are in place, which can include forms, questionnaires, external vulnerability scanning services and 3rd party audits (see the step by step guide below for a table with the four levels of requirements)
Handling card data
Some business models do require the direct handling of sensitive credit card data when accepting payments, while others do not. Companies that do need to handle card data (e.g. accepting untokenised PANs on a payment page) may be required to meet each of the 300+ security controls in PCI DSS. Even if card data only traverses its servers for a short moment, the company would need to purchase, implement and maintain security software and hardware.

If a company does not need to handle sensitive credit card data, it shouldnโ€™t. Third party solutions (e.g. Stripe Elements) securely accept and store the data, whisking away considerable complexity, cost and risk. Because card data never touches its servers, the company would only need to confirm 22 security controls, most of which are straightforward, such as using strong passwords.

Storing data securely
If an organisation handles or stores credit card data, it needs to define the scope of its cardholder data environment (CDE). PCI DSS defines CDE as the people, processes and technologies that store, process or transmit credit card data โ€“ or any system connected to it. Because all 300+ security requirements in PCI DSS apply to CDE, itโ€™s important to properly segment the payment environment from the rest of the business so as to limit the scope of PCI validation. If an organisation is unable to contain the CDE scope with granular segmentation, the PCI security controls would then apply to every system, laptop and device on its corporate network. Yikes!

Annual validation
Regardless of how card data is accepted, organisations are required to complete a PCI validation form annually. The way PCI compliance is validated depends on a number of factors, which are outlined below. Here are 3 scenarios in which an organisation could be asked to show that it is PCI compliant:

  • Payment processors may request it as part of their required reporting to the payment card brands
  • Business partners may request it as a prerequisite to entering into business agreements
  • For platform businesses (those whose technology facilitates online transactions among multiple distinct sets of users), customers may request it to show their customers that they are handling data securely
The latest set of security standards, PCI DSS version 3.2.1, includes 12 main requirements with over 300 sub-requirements that mirror security best practices.


  1. Build and maintain a secure network and systems
  2. Install and maintain a firewall configuration to protect cardholder data
  3. Do not use vendor-supplied defaults for system passwords and other security parameters
    Protect cardholder data
  4. Protect stored cardholder data
  5. Encrypt transmission of cardholder data across open or public networks
    Maintain a vulnerability management programme
  6. Protect all systems against malware and regularly update anti-virus software
  7. Develop and maintain secure systems and applications
    Implement strong access control measures
  8. Restrict access to cardholder data by business need to know
  9. Identify and authenticate access to system components
  10. Restrict physical access to cardholder data
    Regularly monitor and test networks
  11. Track and monitor all access to network resources and cardholder data
  12. Regularly test security systems and processes
    Maintain an information security policy
  13. Maintain a policy that addresses information security for all personnel
To make it โ€œeasierโ€ for new businesses to validate PCI compliance, the PCI Council has created nine different forms or Self-Assessment Questionnaires (SAQs) that are a subset of the entire PCI DSS requirement. The trick is working out which is applicable or whether itโ€™s necessary to hire a PCI Council-approved auditor to verify that each PCI DSS security requirement has been met. In addition, the PCI Council revises the rules every three years and releases incremental updates throughout the year, adding even more dynamic complexity.
 
6
•••
There are serious penalties for PCI non-compliance

https://www.pcicomplianceguide.org/faq/#15

Q15: What are the penalties for non-compliance?
A: The payment brands may, at their discretion, fine an acquiring bank $5,000 to $100,000 per month for PCI compliance violations. The banks will most likely pass this fine along until it eventually hits the merchant. Furthermore, the bank will also most likely either terminate your relationship or increase transaction fees. Penalties are not openly discussed nor widely publicized, but they can be catastrophic to a small business. It is important to be familiar with your merchant account agreement, which should outline your exposure.
 
Last edited:
9
•••
Isn't this something that many registrars do? That "save your credit card for easier future transactions"? Good thing I don't use Porkbun anymore, they force you to to have at least 1 saved and if removal is wanted, you have to contact them. Aren't almost all registrars considered as violators of this rule?
Porkbun, they really force you to have CC on file???
I use it for years via PayPal.
 
0
•••
Isn't this something that many registrars do? That "save your credit card for easier future transactions"? Good thing I don't use Porkbun anymore, they force you to to have at least 1 saved and if removal is wanted, you have to contact them. Aren't almost all registrars considered as violators of this rule?

Porkbun, they really force you to have CC on file???
I use it for years via PayPal.

Porkbun doesn't force you to do anything. But if you choose to save your card details they do that securely (see above posts regarding saving card info). Porkbun is run by people who actually know what they're doing.

Putting Porkbun next to Epik is like putting a Tesla next to a toy car that doesn't even work properly as a toy.
 
11
•••
Another potentially disturbing thing that hasnโ€™t been mentioned was people having to submit documents to prove their identity to conduct sales on the platform. Wondering if this stuff was stored safely or does the dark web have our licenses, picture ids etc.
 
14
•••
Last edited:
8
•••
I have come across registrars that force you to save a card just to open an account. I don't like it.

BUT the simple method for removing the card is just: add other payment method: add Paypal.
Then delete the saved card at the registrart because they now allow that because you have another payment method saved.
Then go into the Paypal account and cancel the recurring payments authorisation for that merchant - they now cannot get payments from you unless you specifically authorise them.
 
Last edited:
5
•••
Porkbun doesn't require PayPal agreement, nothing to cancel.
 
Last edited:
0
•••
Last edited:
4
•••
Another potentially disturbing thing that hasnโ€™t been mentioned was people having to submit documents to prove their identity to conduct sales on the platform. Wondering if this stuff was stored safely or does the dark web have our licenses, picture ids etc.

A lot of sites make customers do that (PayPal, Escrow, betting sites etc), but it is a good question!

Once you submit this data itโ€™s supposed to be discarded and retained only internally โ€“ Non-Epik customers being affected by this breach (ie Epik collecting and storing personal data they didnโ€™t need to collect), it wouldnโ€™t surprise me if Epik customers identities such as passports was stored externally therefore could be accessed by 3rd parties.
 
Last edited:
1
•••
Porkbun, they really force you to have CC on file???
I use it for years via PayPal.

I remembered at one time I paid with CC and it got stuck there since.

Just now I checked back, was able to delete all payment methods from my dashboard. Either I thought wrong, or the bun did change something. Sorry for the bad reporting.
 
5
•••
This thread raised the question of how other registrars deal with credit card handling and compliance.

Here's how Joker is doing it.

https://joker.com/?mode=page&page=security

Certified Credit Card Security at Joker.com
Joker.com fully complies to the requirements of the credit card industry, defined by the PCI Data Security Standard.
This includes a security audit, performed by an external service provider, executed every 3 month.
This serves to protect your payment data, which Joker.com handles with greatest care. Joker.com uses this data solely for the purpose of payment.
You can click the Sysnet logo on their site to see the latest compliance info.

upload_2021-9-27_14-35-44.png
 
Last edited:
5
•••
We need to hear from Epik.

If Rob can drop by this thread and continue to "like" random posts, then surely he can make a goddamn statement updating us on just how big of a mess this is.

It's absolutely bullshit
 
6
•••
Yeah, porkbun is fine. Really like everything @ porkbun - except the name LOL.

Should Epik survive, they might want to consider something similar if they want to be trusted:

https://www.encirca.com/soc2-certified/

EnCircaโ€™s SOC 2 Audit Reports
EnCirca is pleased to provide copies of its SOC 2 security audit report available to existing and prospective customers, partners and Registry suppliers. The 84-page SOC 2 Report is available after the execution of a Non-Disclosure Agreement. For those of you who do not require this level of detail, a shorter 10-page SOC 3 Report is publicly available below.

What is SOC 2 Certification?
SOC 2 certification assures clients we use systems to protect their data. It audits security, availability, process integrity, privacy and confidentiality. EnCirca has a Type 2 certification covering a twelve month period from March 1, 2019 to February 29, 2020.

SOC 2 covers operational control systems following a predefined Trust Services Principles and Criteria around security, availability, process integrity, privacy and confidentiality. SOC 2 certification assures our customers that we have adequate control systems in place to safeguard their data and information.


Encirca is a stable retail registrar, Had a few snapnames catches with them (years ago). No issues.

Edited: the copypasted text above refers to 2020, but it seems they are also set for 2021:
https://www.encirca.com/wp-content/uploads/2021/04/EnCirca-2021-SOC-3-Audit.pdf
 
Last edited:
3
•••
Saving your credit card information is not necessarily a violation. Many websites do it.

In reality right now nobody really knows how all the other 600 or so retail Registrars are handling customer data and its storage.

Brad, I consider you to be a fair and professional member of the forum and as such wouldn't you agree that as we are holding Epik accountable for some of their actions (or lack thereof) but that it's equally important to do an Industry wide inspection of all the security and business practices of all the other Registrars and Registries at this time.

If the goal is to protect the customers (the Registrants) don't you think that there should be some kind of uniform standards and protocols when it comes to keeping customers data safe and don't you think that ICANN should immediately implement certain safeguards across the board to make sure that the situation with Epik doesn't occur again in the future with any other Registrar.

We need to hold Epik accountable but if the goal is customer (Registrant) safety and security then focusing all our attention on Epik and ignoring all the other 600 or so retail Registrars doesn't sound very smart.

Logic says that we should use this as a learning experience to fix the whole Industry.

IMO
 
Last edited:
0
•••
Escrow.com is taking steps.
upload_2021-9-27_16-20-33.png
 
14
•••
It would be better if you kept your posts factual. Epik did not release these details. Anonymous release the details. Yes, Epik left the details vulnerable, no doubt, but they did not release them at all. It's pretty clear you have rather a vendetta against Rob. That's up to you, but your contribution to this thread might be more valuable if you'd leave some of the personal remarks about him out of this.

It would be better if you didn't tell me what to do and started caring about others, the 100,000 people who have had their lives destroyed by a man. I confronted Rob years ago about his lies and lack of concern for his users' privacy and now we have this and based on his arrogant and insane response thus far he doesn't care.

Edit by moderator: name calling and threats removed. Warning issued.
 
Last edited by a moderator:
0
•••
No online platform that takes card payments serious stores it locally. At Dan for example, we store zero card information in our own database. We pass the information to Adyen and they store it as they are the experts in keeping that data safe. So having your card information stored somewhere isn't the problem but how and by whom it's stored is important to know.

This is correct. Only people who don't care about their users or the laws would try to store credit card details of their users, which is exactly why we are all in this threat talking about the actions of epik and rob monster.
 
0
•••
Another potentially disturbing thing that hasnโ€™t been mentioned was people having to submit documents to prove their identity to conduct sales on the platform. Wondering if this stuff was stored safely or does the dark web have our licenses, picture ids etc.
This is my concern. I have only ever used Epik once for an Escrow, as the request of the buyer. I had to provide them with various documentation - which could now be circulating freely.

Great.
 
Last edited:
3
•••
Dynadot โ€” .com TransferDynadot โ€” .com Transfer
Spaceship
Domain Recover
CatchDoms
DomainEasy โ€” Payment Flexibility
  • The sidebar remains visible by scrolling at a speed relative to the pageโ€™s height.
Back