No-IP regains control of some domains wrested by Microsoft

But a spokeswoman said one of its main domains used for its services isn't available

A Nevada-based company has regained control of the majority of domains seized by Microsoft in a legal action aimed at shutting down botnets.

Vitalwerks, which runs No-IP, said it now has 18 of 23 domains commandeered by Microsoft on Monday using a restraining order granted by the state's federal court.

No-IP spokeswoman Natalie Goguen said Wednesday No-IP is waiting for Public Interest Registry, which controls all ".org" top-level domains, to make the rest of the company's domains available. She wrote that the company still does not control "," which is one of the company's most-used domains.

No-IP offers a free dynamic DNS service that updates DNS entries for a domain hosted on a computer that is assigned varying IP addresses by an ISP. A subdomain is assigned to a customer, and the DNS record is updated as a computer's IP address changes.

The company's services went offline Monday when Microsoft served it with the restraining order. Although Microsoft doesn't accuse No-IP of wrongdoing, it alleged the company failed to take prompt action when cybercriminals used its service for managing botnets, or networks of hacked computers.

Microsoft intended to simply filter out the botnet-related traffic from No-IP's domains. But a technical error knocked some of No-IP's customers offline, although Microsoft said on Tuesday the issues had been resolved. No-IP disagreed.

A Microsoft spokesman said on Wednesday the company had no comment.

Microsoft's civil suit alleges two men in Algeria and Kuwait used No-IP's services to maintain contact with computers they hacked using two malware families called Bladabdindi and Jenxcus.

Send news tips and comments to Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags MicrosoftsecurityNo-IPCivil lawsuitslegalVitalwerkscybercrime

More about Microsoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place