Saturday, May 18, 2024

ICANN Launches RDRS to Assist Law Enforcement Agencies to Discover Private Info

ICANN is a non-profit organization that is responsible for coordinating the global internet’s-

  • DNS
  • IP address allocation

This organization manages the distribution and maintenance of domain names and ensures the stable and secure operation of the Internet.

ICANN introduced RDRS (Registration Data Request Service), which streamlines access requests to nonpublic registration data for gTLDs (Generic top-level domains) with a consistent and standardized format.

ICANN launched this new service to assist law enforcement in discovering the private information and data of domain owners.


ICANN-accredited registrars must censor personal data from public records, creating challenges in accessing needed information. RDRS simplifies and standardizes the process for requesting such data.

RDRS serves ICANN registrars and stakeholders with legitimate interests, including:-

  • Law enforcement
  • Intellectual property professionals
  • Consumer advocates
  • Cybersecurity experts
  • Government officials

RDRS manages nonpublic gTLD registration data requests, connecting requestors with participating ICANN-accredited registrars.

The platform streamlines and standardizes the process for efficient request submission and handling.

RDRS doesn’t guarantee data access but offers a unified platform for nonpublic gTLD registration requests. 

As the communication occurs outside the system. The service streamlines the process, automatically identifying the correct registrar and avoiding multiple forms. 

It centralizes access to pending and past requests, which allows the following things:-

  • Create new requests
  • Develop request templates
  • Cancel requests

Besides this, the registrars benefit from automated alerts and standardized forms for efficient request evaluation.

ICANN Board directs RDRS for usage data to inform Standardized Access/Disclosure policy. However, the increased usage enhances the data accuracy for informed decisions.


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles