<s>
Domain	B-Protocol
hijacking	I-Protocol
or	O
domain	B-Protocol
theft	I-Protocol
is	O
the	O
act	O
of	O
changing	O
the	O
registration	O
of	O
a	O
domain	O
name	O
without	O
the	O
permission	O
of	O
its	O
original	O
registrant	O
,	O
or	O
by	O
abuse	O
of	O
privileges	O
on	O
domain	O
hosting	O
and	O
registrar	B-Protocol
software	O
systems	O
.	O
</s>
<s>
Domain	B-Protocol
hijacking	I-Protocol
can	O
be	O
done	O
in	O
several	O
ways	O
,	O
generally	O
by	O
unauthorized	O
access	O
to	O
,	O
or	O
exploiting	O
a	O
vulnerability	O
in	O
the	O
domain	O
name	O
registrar	B-Protocol
's	O
system	O
,	O
through	O
social	O
engineering	O
,	O
or	O
getting	O
into	O
the	O
domain	O
owner	O
's	O
email	O
account	O
that	O
is	O
associated	O
with	O
the	O
domain	B-Protocol
name	I-Protocol
registration	I-Protocol
.	O
</s>
<s>
A	O
frequent	O
tactic	O
used	O
by	O
domain	O
hijackers	O
is	O
to	O
use	O
acquired	O
personal	O
information	O
about	O
the	O
actual	O
domain	O
owner	O
to	O
impersonate	O
them	O
and	O
persuade	O
the	O
domain	O
registrar	B-Protocol
to	O
modify	O
the	O
registration	O
information	O
and/or	O
transfer	O
the	O
domain	O
to	O
another	O
registrar	B-Protocol
,	O
a	O
form	O
of	O
identity	O
theft	O
.	O
</s>
<s>
Responses	O
to	O
discovered	O
hijackings	O
vary	O
;	O
sometimes	O
the	O
registration	O
information	O
can	O
be	O
returned	O
to	O
its	O
original	O
state	O
by	O
the	O
current	O
registrar	B-Protocol
,	O
but	O
this	O
may	O
be	O
more	O
difficult	O
if	O
the	O
domain	O
name	O
was	O
transferred	O
to	O
another	O
registrar	B-Protocol
,	O
particularly	O
if	O
that	O
registrar	B-Protocol
resides	O
in	O
another	O
country	O
.	O
</s>
<s>
If	O
the	O
stolen	O
domain	O
name	O
has	O
been	O
transferred	O
to	O
another	O
registrar	B-Protocol
,	O
the	O
losing	O
registrar	B-Protocol
may	O
invoke	O
ICANN	O
's	O
Registrar	B-Protocol
Transfer	O
Dispute	O
Resolution	O
Policy	O
to	O
seek	O
the	O
return	O
of	O
the	O
domain	O
.	O
</s>
<s>
In	O
some	O
cases	O
the	O
losing	O
registrar	B-Protocol
for	O
the	O
domain	O
name	O
is	O
not	O
able	O
to	O
regain	O
control	O
over	O
the	O
domain	O
,	O
and	O
the	O
domain	O
name	O
owner	O
may	O
need	O
to	O
pursue	O
legal	O
action	O
to	O
obtain	O
the	O
court	O
ordered	O
return	O
of	O
the	O
domain	O
.	O
</s>
<s>
Although	O
the	O
legal	O
status	O
of	O
domain	B-Protocol
hijacking	I-Protocol
was	O
formerly	O
thought	O
to	O
be	O
unclear	O
,	O
certain	O
U.S.	O
federal	O
courts	O
in	O
particular	O
have	O
begun	O
to	O
accept	O
causes	O
of	O
action	O
seeking	O
the	O
return	O
of	O
stolen	O
domain	O
names	O
.	O
</s>
<s>
Domain	B-Protocol
hijacking	I-Protocol
is	O
analogous	O
with	O
theft	O
,	O
in	O
that	O
the	O
original	O
owner	O
is	O
deprived	O
of	O
the	O
benefits	O
of	O
the	O
domain	O
,	O
but	O
theft	O
traditionally	O
relates	O
to	O
concrete	O
goods	O
such	O
as	O
jewelry	O
and	O
electronics	O
,	O
whereas	O
domain	O
name	O
ownership	O
is	O
stored	O
only	O
in	O
the	O
digital	O
state	O
of	O
the	O
domain	B-Protocol
name	I-Protocol
registry	I-Protocol
,	O
a	O
network	O
of	O
computers	O
.	O
</s>
<s>
For	O
this	O
reason	O
,	O
court	O
actions	O
seeking	O
the	O
recovery	O
of	O
stolen	O
domain	O
names	O
are	O
most	O
frequently	O
filed	O
in	O
the	O
location	O
of	O
the	O
relevant	O
domain	B-Protocol
registry	I-Protocol
.	O
</s>
<s>
In	O
some	O
cases	O
,	O
victims	O
have	O
pursued	O
recovery	O
of	O
stolen	O
domain	O
names	O
through	O
ICANN	O
's	O
(	O
Uniform	O
Domain	O
Name	O
Dispute	O
Resolution	O
Policy	O
(	O
UDRP	O
)	O
,	O
but	O
a	O
number	O
of	O
UDRP	O
panels	O
have	O
ruled	O
that	O
the	O
policy	O
is	O
not	O
appropriate	O
for	O
cases	O
involving	O
domain	B-Protocol
theft	I-Protocol
.	O
</s>
<s>
In	O
early	O
2021	O
,	O
Perl	O
’s	O
domain	O
was	O
briefly	O
hijacked	O
,	O
causing	O
a	O
relatively	O
major	O
issue	O
with	O
CPAN	B-Language
.	O
</s>
<s>
ICANN	O
imposes	O
a	O
60-day	O
waiting	O
period	O
between	O
a	O
change	O
in	O
registration	O
information	O
and	O
a	O
transfer	O
to	O
another	O
registrar	B-Protocol
.	O
</s>
<s>
This	O
is	O
intended	O
to	O
make	O
domain	B-Protocol
hijacking	I-Protocol
more	O
difficult	O
,	O
since	O
a	O
transferred	O
domain	O
is	O
much	O
more	O
difficult	O
to	O
reclaim	O
,	O
and	O
it	O
is	O
more	O
likely	O
that	O
the	O
original	O
registrant	O
will	O
discover	O
the	O
change	O
in	O
that	O
period	O
and	O
alert	O
the	O
registrar	B-Protocol
.	O
</s>
<s>
Extensible	B-Protocol
Provisioning	I-Protocol
Protocol	I-Protocol
is	O
used	O
for	O
many	O
TLD	O
registries	O
,	O
and	O
uses	O
an	O
authorization	O
code	O
issued	O
exclusively	O
to	O
the	O
domain	O
registrant	O
as	O
a	O
security	O
measure	O
to	O
prevent	O
unauthorized	O
transfers	O
.	O
</s>
<s>
There	O
are	O
certain	O
steps	O
that	O
a	O
domain-name	O
owner	O
can	O
take	O
to	O
reduce	O
the	O
exposure	O
to	O
domain	B-Protocol
name	I-Protocol
hijacking	I-Protocol
.	O
</s>
<s>
Use	O
a	O
domain-name	O
registrar	B-Protocol
that	O
offers	O
enhanced	O
transfer	O
protection	O
,	O
i.e.	O
,	O
"	O
domain	O
locking	O
"	O
and	O
even	O
consider	O
paying	O
for	O
registry	O
locking	O
.	O
</s>
<s>
If	O
you	O
have	O
2500	O
or	O
more	O
domain	O
names	O
consider	O
buying	O
your	O
own	O
registrar	B-Protocol
.	O
</s>
<s>
Relief	O
via	O
the	O
Inter-Registrar	O
Dispute	O
Process	O
.	O
</s>
<s>
-	O
Domain	B-Protocol
Registry	I-Protocol
Grace	O
Period	O
Mapping	O
(	O
e.g.	O
</s>
