The harm will depend on the actions of the attacker after it gains control of the domain name, the issues created by the attacker, and the value and importance placed on the contents of the registrant’s website, emails and other services attached to the domain name. For example, (i) the attacker may change the visual appearance of a registrant’s web portal to demonstrate its ability to deface such website thus affecting the registrant’s reputation, (ii) interfere with activities over the registrant’s web portal thereby causing disruption and/or economic losses, or (iii) trick end users into believing that services provided over the registrant’s web portal are nevertheless legitimate so much so that users continue to transact using such services, resulting in sensitive information being leaked to the attacker.