EnCirca offers Amazon’s .BOT domains in Sunrise

Register for .BOT Sunrise  starting now until July 14th for $300.00
Eligibility for Sunrise is limited to companies that have registered their trademark with the Trademark Clearinghouse.

Why .BOT?

Bots are software programs traditionally used to accomplish repetitive tasks. For example, online chat bots can be used to streamline a company’s customer service. Physical robots can be used offline to move merchandise within a fulfillment center. As technology advances, we’re seeing AI and messaging platforms open up to third party bots allowing users to accomplish tasks from within the platform.

Amazon, the .BOT Registry, is focused on creating a dedicated online space for this community and have seen tremendous interest in what they are developing. They intend to offer continuous value for all .bot domain registrants by developing unique features for this rapidly growing community and their customers.

How fast is the bot space growing?

More and more businesses are launching chat-based bots for customer engagement. The number of chat bots on messaging channels (i.e. SMS, Facebook Messenger, Kik, Slack, Telegram, etc.) have grown 2,400% over the past year, from 5,000 in 2016 to 125,000+ in 2017. The industry is seeing strong market adoption, end user acceptance and we anticipate that brands are in the process of building their own chat bots (or will want to do so in the near future).
Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

 WannaCry Ransomware – Don’t Submit to the Amateurs!

I am sure by now most of you have heard of Ransomware, the malicious software that holds your data hostage and demands a sum of money for its return. In 2015, even the FBI agreed ransomware is here to stay. This time, it wouldn’t stop with home computers, but it will spread to infect:

“Businesses, financial institutions, government agencies, academic institutions, and other organizations… resulting in the loss of sensitive or proprietary information.”


  There are two types of ransomware in circulation:

  Encryptors incorporate advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can de-crypt the blocked content.

  Lockers lock the victim out of the operating system, making it impossible to access the desktop and any applications or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

  Some locker versions infect the Master Boot Record (MBR). The MBR is the section of a PC’s hard drive which enables the operating system to boot up. When MBR ransomware strikes, the boot process can’t complete as usual and prompts a ransom note to be displayed on the screen.

  Crypto-ransomware, as encryptors are usually known, are the most widespread ones. Some other characteristics of ransomware include, but are not limited to:

  • The ransomware may scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom.
  • It may add a different extension to your files, to sometimes signal a specific type of ransomware strain.
  • It will display an image or a message that lets you know your data has been encrypted and that you must pay a specific sum of money to get it back.
  • It requests payment in Bitcoins because this crypto-currency cannot be tracked by cyber security researchers or law enforcement agencies.
  • Usually, the ransom payments have a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed forever.
  • It uses a complex set of evasion techniques to go undetected by traditional antivirus (please visit the link below to find out why your antivirus is not protecting you.)
  • It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks.
  • It can spread to other PCs connected to a local network, creating further damage.
  • It frequently features data exfiltration capabilities, which means that it can also extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals; encrypting files isn’t always the endgame, especially where financial institutions are concerned.

   I want to focus for a moment on the ransomware known as WannaCry. WannaCry ransomware attacks windows based machines. It also goes by the name WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY.

  EternalBlue is an exploit generally believed to have been developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on 14 April 2017. EternalBlue exploits a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 server in various versions of Microsoft Windows accepts specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.

   The standard Windows security update on 14 March 2017 resolved the issue via security update MS17-010 , for all Windows versions that were currently supported at that time, these being Windows Vista, Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.

  Many Windows users had not installed MS17-010 when, two months later on 12 May 2017, the WannaCry attack used the EternalBlue vulnerability to spread itself.

  The creators of the ransomware WannaCry made some amateurish mistakes, including an easy-to-find kill switch and the unsophisticated way the attackers are demanding bitcoin from their victims.

  There are kits sold on the dark web that already pre-build in anonymity of the perpetrators, this is what experts think they’re seeing with WannaCry. It appears that some Script Kiddies are using software tools created by somebody else. The “killswitch” is an URL included in the code, which was used to stop the malware’s spread. The kill switch allowed people to prevent the infection chain fairly quickly.

  Sophisticated ransomware usually has an automated way to accept payments from victims who want to unlock their computers, but WannaCry’s system seems to be manual — the scammers have to send each victim a code. This doesn’t seem practical for an infection involving thousands and thousands of computers.

  The scammers have collected payments from fewer than 200 victims. We know this, because they’re demanding bitcoin — and bitcoin transactions are public. We don’t know the scammers’ names, but we know the bitcoin addresses they’re using to receive payment — just three addresses. Again, more sophisticated ransomware would have the ability to generate a unique bitcoin address for each victim. So far, the attackers have collected about $60,000 worth of bitcoins which are just sitting there untouched, according to Jonathan Levin, co-founder of Chainalysis, a company that analyzes bitcoin usage to identify money-laundering. He’s been watching the bitcoins accumulating at WannaCry’s three addresses.

  “It might be that they don’t have a good idea yet about how to launder the bitcoin,” he said. “Perhaps they’re not really set up to take advantage of the success of their campaign so far.” Scammers sometimes have safe-zones — usually their home country — where their malware doesn’t do any damage. If the malware detects native language on the computer, it will not execute, sometimes deleting itself. WannaCry doesn’t do that either. Levin says if the perpetrators actually live in one of the countries hit hard by this attack — say, Russia — that would be, as he puts it, “an incredibly bad life choice.”


  Often, people are lulled into a false sense of security because they believe they are protected because they have an antivirus. This is just not true.  Click here to find out why.

  Preventative maintenance is always the best way to go. Here’s what you can do to prevent being extorted by ransomware:

Locally, on the PC

Don’t store important data only on your computer, have 2 backups of data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.

The Dropbox/Google Drive/OneDrive/etc. application on your computer should not be turned on by default. Only open them once a day, to sync data, and close them once this is done.

Keep your operating system and the software you use up to date, including the latest security updates.

For daily use, don’t use an administrator account on your computer. Use a guest account with limited privileges.

Turn off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.

Microsoft has released a Windows security patch MS17-010 for Windows
machines. This needs to be applied immediately and urgently.

Remove Windows NT4, Windows 2000 and Windows XP-2003 from production

Block ports 139, 445 and 3389 in firewall.

SMB is enabled by default on Windows. Disable smb service on the
machine by going to Settings > uncheck the settings > OK

In the browser

Remove the following plugins from your browsers: Adobe Flash, Adobe Reader, Java and Silverlight. If you absolutely must use them, set the browser to ask to activate these plugins when needed.

Adjust your browsers’ security and privacy settings for increased protection. (Instructions for FirefoxSafariInternet Explorer or Google Chrome.)

Remove outdated plugins and add-ons from browsers. Only keep the ones used on a daily basis and keep them updated to the latest version.

Use an ad-blocker to avoid the threat of potentially malicious ads.

Online behavior

Never open spam emails or emails from unknown senders.

Never download attachments from spam emails or suspicious emails.

Never click links in spam emails or suspicious emails.

Anti-ransomware security tools

Use a reliable, paid antivirus product that includes an automatic update module and a real-time scanner.

Understand the importance of having a traffic-filtering solution that can provide proactive anti-ransomware protection.


  You can find a more extensive Ransomware protection plan here.

  Brought to you by the same security company is a list of ransomware decryption tools you can use to avoid paying the criminals. Keep in mind that they may become obsolete as the malware is likely to change frequently as time goes on.

  There also a few decryption tools available for some versions of Windows that have been affected with WannaCry.



  Also, this, from the logicboxes helpdesk:

What are we doing on our Windows shared servers?

We are already in the phase of applying Windows updates on all our
shared hosting Windows servers. However we need to reboot servers
in-order to apply those security patches. We shall announce the
schedule for server reboot in this thread shortly.

What you need to do in case of our Windows dedicated servers?

You need to patch the Windows dedicated server immediately using the
steps mentioned in the link : https://goo.gl/PYIEis

In-addition to this, please block the IP addresses, domains and file
names mentioned in this link : https://goo.gl/JsSo0v

You can also refer to the following links to apply the necessary fix.




For dedicated servers, once you have applied necessary changes, you
need to reboot the server.

Please feel free to contact our support desk if you have any questions.

LogicBoxes Helpdesk?

If you follow these protocols to keep your data protected there is no need to fear ransomware.


Ensight security alerts and recommendations is a free service of EnCirca, the most secure domain name Registrar.

Have a question or suggestion about an EnSight article? Please contact Ensight@encirca.com

EnCirca Welcomes New Customers From 1ISI Registrar

EnCirca welcomes new customers from the recently terminated 1ISI Registrar. 1ISI, also known as #1 Internet Services International, lost
its ICANN Accreditation status due to contractual compliance issues.

All of the domains previously registered with 1ISI have been transferred to EnCirca, where they are available for management, including: Renewals, Name Server updates and Whois updates.

The new customers should contact EnCirca support if they have not received a welcome email or have any questions or concerns about their domain names.

Get .ART now at EnCirca

.ART  General Availability starts today!

Get the world’s most creative address for only $15

What is the .ART domain about?

  • is an immediate signifier for arts and culture related content
  • allows user to be part of global community
  • offers opportunity to start new projects, launch special exhibitions, and create micro sites
  • reinforces brand identity in a rapidly growing online market

Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

.health Sunrise starts today at EnCirca

Register for Sunrise starting now until July 7 – $375.00
Eligibility for Sunrise is limited to companies that have registered their trademark with the Trademark Clearinghouse.
DotHealth is the new domain extension for brands, organizations, and people who provide high-quality health products, services, and information. In today’s digital health landscape, it can be difficult to find credible health information. .HEALTH is designed to eliminate confusion and uncertainty by providing an instantly recognizable address that makes it easier for users to find the reliable, relevant information they need for a healthier life.

Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

Preventing Data Breaches with EnCirca’s Multi-factor Authentication and SSL Certificates


  As security threats continue to evolve, EnCirca stays ahead of the game by providing our customers with enhanced security features. Our customers trust us to protect their privacy and sensitive data and we take that very seriously.

EnCirca Two-Factor Authentication Service


 What is two-factor authentication (2FA)?


2FA, sometimes known as Multi-factor authentication (MFA), requires an additional security step to conduct certain operations. At EnCirca, if your account is enabled for 2FA, it will impact the following operations for all domains in your account:

1. Updating your customer record
2. Changing a domain’s Name servers
3. Updating Whois contact data
4. Updating Name servers info

*.BANK and .INSURANCE customers are required to use 2FA 

How does it work?

   EnCirca uses a third-party software app called AUTHY to implement its 2FA service. This app may be downloaded and installed on nearly any mobile device, including: Android, Apple, Blackberry, OSX, Windows and Linux. 

EnCirca’s SSL


  Part of protecting your domain means purchasing and installing an SSL Certificate.

It is up to you to evaluate risk and put security measures in place to mitigate those risks.

  Thieves steal data if left unchecked. Business competitors infiltrate websites and alter files or disrupt services if left unprotected. More and more we are seeing Distributed Denial-of-Service (DDoS) and other cyber-attacks with the intention of crippling or destroying services.
  The foundation of trusted point-to-point communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use website and the endpoint server, making it difficult for those sites to be imitated or forged. SSL certificates are purchased from companies known as certificate authorities (CAs).

  To get started, you need to decide what type of SSL Certificate is right for your business. 

Under the Safeguards Rule, financial institutions must protect the consumer information they collect.


  Many companies collect personal information from their customers, including names, addresses, and phone numbers; bank and credit card account numbers; income and credit histories; and Social Security numbers.
  The Gramm-Leach-Bliley (GLB) Act requires companies defined under the law as “financial institutions” to ensure the security and confidentiality of this type of information. As part of its implementation of the GLB Act, the Federal Trade Commission (FTC) issued the Safeguards Rule, which requires financial institutions under FTC jurisdiction to have measures in place to keep customer information secure. But safeguarding customer information isn’t just the law. It also makes good business sense. When you show customers you care about the security of their personal information, you increase their confidence in your company. The Rule is available at ftc.gov
  Selecting the right SSL Certificate depends on a variety of factors including security level, trust level, and visibility to the web visitor.
Encrypting every page and domain is recommended for a few reasons. One, your site visitors will know that their browsing activity is encrypted, (the customer will see that extra security in the form of a “green bar” that tells them the site is secure) and another is that encrypting every page now helps your pages rank better in Google’s search engine algorithm.
  EnCirca recommends Extended Validation Certificates. EV Certificates are superior because the EV certificate is the most stringent verification process in SSL certificate issuance. A customer visiting an EV-protected website can be assured that they are not visiting a phishing site.
To fully meet your needs, we offer the following different types of certificates:

Standard SSL Certificates – require the certificate issuer to independently verify the information concerning the applicant’s business.
Extended Validated (EV) Certificates – the applicant’s business credentials are validated more extensively to help ensure that the applicant isn’t a phisher, spoofer, or other type of online criminal.
Wildcard Certificates – protect multiple options of the same base domain (i.e. www.sample.bank and directory.sample.bank)
SAN Certificates – protect multiple, different domains (i.e. www.sample.bank and sample.com)
  Several steps are required to make SSL certificates functional. The website administrator needs to generate a Certificate Signing Request (CSR) for the server where the certificate will be installed. The domain needs to be validated, and finally, the certificate is then installed.
Please visit us at EnCirca’s SSL page for assistance in securing the appropriate SSL certificates for your business.
It is necessary to implement tighter security. EnCirca makes it easy.  




Registration for .CREDITUNION starts today at EnCirca

Register for Sunrise starting now until June 3 – $300.00
Eligibility for Sunrise is limited to credit unions that have registered their trademark with the Trademark Clearinghouse.
Pre-Register for GA until June 2nd. GA starts June 6
$150.00 $111.00 first-year introductory pre-registration special!
Renewals at the regular price of $150.00
Open to all credit unions on a first-come, first-serve basis.
If your name is taken, we will refund your fee.

Dot CREDITUNION will be an excellent tool for credit unions to provide a trusted online market to promote their products and services while providing members with a greater level of security and confidence.

  • Whois Privacy is not permitted by the registry
  • Eligibility for .CREDITUNION is limited to bona fide Credit Unions with a primary office based in the United States.
  • The selection of a .CREDITUNION domain name must match or be derived from the Credit Union’s legal name or trademark.

Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.


Daily Picks for .Pro Auction at SnapNames 5/1/17

Here are today’s top picks for .Pro auctions at SnapNames:





To see all of the SnapNames auctions, visit: .Pro’s Auction page.