Godaddy are into “wire fraud”

Tags: , , , ,

First, you will received a phishing spam…

As you know, hackers will try to send you to a phishing page by including a backlink url.

As you can see, the backlink url is “”.

The domain “” is actually own by Godaddy. You can check the whois…

Click here to read more about GoDaddy

So, if you follow the url backlink , you will end up on a phishing page, who is also under the domain “”…

BTW, if the page didn’t exist, you would had get a “Page not found” error message…

They are trying to steal your “email address” with your “password”. It’s not even a “sign in” form, but an simple “form”.

They will also make you believe it’s about your “Microsoft” account…

GoDaddy have commit “insurpation”. It’s a crime!

BTW, the “navigation bar” is a simple image…

The image is hosted with the domain “”… witch is also own by GoDaddy…

You can check the whois…

If you doubt, you could go check the “source code” of the phising page…

If you look deeper at the source code, you will also know that the form is using a script hosted with “”…

The domain “” is also own by GoDaddy…

You can check the whois..

And for last, by looking at the “source code”, you will know that the form is sending the data to the email “”.

GoDaddy is a criminal organisation.

I am Ben Deschenes. GoDaddy had been slandering me. They also had hacked my business email acount with them to send out over 4,000,000,000 spams.

GoDaddy is part of a corrupted and rigged internet.

You can contact Nina Kelly , general counsel at Godaddy at and “”.

You can also contact their head quarter at “”. is fully aware of all the criminality online by their resellers such as GoDaddy but has been covering it for years instead of taking actions against those crooks.

Computer and Interner fraud

Fraud through the criminal use of a computer or the Internet can take many different forms. “Hacking” is a common form, in which a perpetrator uses technological tools to remotely access a protected computer or system. Another common form involves the interception of an electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. 

Examples of computer or internet fraud in action include but are not limited to:

  • Emails requesting money in return for small deposits, also known as an advance-fee scam, such as the infamous Nigerian prince scam.
  • Emails attempting to gather personal information such as account numbers, Social Security numbers, and passwords; also known as phishing.
  • Using someone else’s computer to access personal information with the intent to use such fraudulently.
  • Installing spyware or malware to engage in data mining.
  • Violating copyright  laws by copying information with the intent to sell it.
  • Hacking into or illegally using a computer to change information, such as grades, work reports, etc.
  • Sending computer viruses or worms with the intent to destroy or ruin another’s computer.
  • Denial of service, in which an authorized user’s access to a network is intentionally interrupted

Click here to read more about Herb Waye