Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago, are now used for illegal activities.

Former FBI web domains were used by crooks to serve porn or spread adware. Some of the sites that were abused by cyber criminals belong to the lot of domains that were seized from popular entrepreneur Kim Dotcom.

Attention I’m not talking about common sites, but two of the most popular domains of all time, and

The choice of the fraudsters is not casual, these websites were able to attract a large audience, by using them crooks have maximized the efficiency of their malicious campaign.

The websites weren’t hacked by crooks, instead they were taken over thanks  to the FBI’s forgetfulness to renew them. Once discovered the abuse the authorities have immediately suspended the domains removing any content.

The news was first reported by the news website Torrent Freak, which noticed that the domains that used to be run by Kim Dotcom were redirecting visitors to porn websites, sited offering, adware, bogus special offers, and fake security software.

“The Department of Justice has made a grave error as several seized Megaupload domains are now being exploited for nefarious purposes. A few days ago both and began directing visitors to scams and malware, presumably because the FBI’s cybercrime unit lost control of the main nameserver.”

The domains were seized by the FBI three years ago when the US authorities accused Dotcom of piracy and infringement of copyright. Kim Doctom announced via Twitter the unfortunate episode.

BREAKING: US Govt has lost control of seized Megaupload domain. It’s now linking to porn, drugs, malware & scam ads!

— Kim Dotcom (@KimDotcom) 28 Maggio 2015

“BREAKING: US Govt has lost control of seized Megaupload domain. It’s now linking to porn, drugs, malware & scam ads!” wrote Kim Dotcom.

Ars Technica revealed that the domains had become available because the law enforcement had forgotten to renew its ownership of the domain, which belong to the agency’s Cyber Initiative and Resources Fusion Unit control seized domains. Among the websites controlled by the same Agency there are Mega video domain and several gambling domains.

“Based on evidence collected by Ars, it appears someone at the FBI’s Cyber Division failed to renew the domain registration for CIRFU.NET, the domain which in turn hosted Web and name servers used to redirect traffic headed to seized domains. As soon as they expired, they were snatched up in a GoDaddy auction by a self-described “black hat SEO marketer,” a British ex-pat who calls himself “Earl Grey.”

As of Thursday afternoon, all of the server names associated with the domain no longer resolve to Internet addresses. GoDaddy has apparently suspended the domain registration, and Earl Grey has been ranting about it ever since on Twitter. The CIRFU.NET domain currently remains in limbo.”

The investigators still haven’t discovered who acquired and the seized domains associated, in time I’m writing the unique certainly it that it is now run by Syndk8 Media which is based in Gibraltar.

In the following images are reported the DNS records before and after the take over.

k1 k2

The FBI has yet to comment the incident, but if you are interested to know more about Syndk8 you must read the report published by Ars.


Pierluigi Paganini

cyberdefensegenius - ai chatbot

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...