Trends
Phishing emails exploit fear around RIPE NCC authority and registry roles
Scammers spoof RIPE NCC emails, exploiting misunderstandings about registry authority amid internet number resource governance debates.

Headline
Scammers spoof RIPE NCC emails, exploiting misunderstandings about registry authority amid internet number resource governance debates.
Context
• Scammers are impersonating RIPE NCC to exploit members’ fear of losing IP address resources, highlighting misconceptions about the registry’s role. • The incident reveals deeper structural misunderstandings about ownership and contractual relationships in internet number resource governance. Members of the Réseaux IP Européens Network Coordination Centre (RIPE NCC), the Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, have recently been targeted by fake emails purporting to be official communications. These messages, including ones using subjects such as “Download Review,” demand urgent action to confirm technical data within a short timeframe. In fact, these emails
Evidence
Pending intelligence enrichment.
Analysis
“did not come from RIPE NCC. It was a phishing attempt, exploiting fear—specifically, fear of RIPE NCC’s perceived authority.” Security warnings from RIPE NCC itself confirm that phishing scams have circulated under different guises, such as a fake “Technical Information Verification” email and a bogus “Licence Information Verification” message, none of which originate from the registry’s official domain. Legitimate RIPE NCC announcements appear on certified channels and authenticated mailing lists only. The success of these scams depends less on technical deception and more on psychological leverage. Many internet operators treat registry communications with heightened urgency for fear of losing critical resources such as IPv4 blocks or Autonomous System Numbers. As the commentary notes, “many members subconsciously treat it as a regulator with sovereign power, capable of shutting down their entire business overnight.”
Key Points
- Phishing Exploits Registry Fear
- Registry Roles Versus Perceived Power
- Ownership, Policy and Structural Misunderstandings
Actions
Pending intelligence enrichment.





