Site covering Bo Xilai scandal led to Name.com DDoS, eNom rejects domain as well
Name.com and eNom play hot potato with domain name.
Name.com got hit with a massive distributed denial of service attack at the end of last week, and it appears this is because a site covering the downfall of Chinese Communist Party official Bo Xilai was registered with its service.
The domain registrar had received an anonymous email saying it needed to drop Boxun.com, reports The Washington Post. Shortly thereafter it was hit with a DDoS.
Name.com then received a message that the attack would continue “unless we handed over the domain to the attackers and told the original owner that it was stolen.”
As far as I can tell Name.com was not hosting the site; it was just the domain registrar. I have reached out to Name.com for comment. (Update: Name.com said it was also hosting the site. Update 2: Turns out they were just the registrar. Never mind.)
Name.com quickly dumped the problem on eNom by helping Buxon.com’s owner transfer the name there. eNom didn’t want to have anything to do with it an fobbed it off on German domain registrar 1&1. That’s where the domain is at the time of writing.
[Update 4/24: Name.com has posted about the DDos and how it responded.]