Could this be anything like the DigiNotar hack?[0]<p>If it came out that Symantec's certificate authority was used to issue fraudulent certificates, the damage to their business could be in the hundreds of millions. What if the silence is because Symantec is trying to figure out the best way to break the news to us?<p>Edit: After a bit more reading, Symantec has some history of monitoring .pw for malware and spam.[1][2][3] Perhaps someone just decided they wanted nothing more to do with PW issuer Directi, which apparently has a poor reputation.[4]<p>[0]<a href="https://en.wikipedia.org/wiki/DigiNotar" rel="nofollow">https://en.wikipedia.org/wiki/DigiNotar</a><p>[1]<a href="http://www.symantec.com/connect/blogs/rise-pw-urls-spam-messages" rel="nofollow">http://www.symantec.com/connect/blogs/rise-pw-urls-spam-mess...</a><p>[2]<a href="http://www.symantec.com/connect/blogs/pw-hit-and-run-spam-royal-baby-trend" rel="nofollow">http://www.symantec.com/connect/blogs/pw-hit-and-run-spam-ro...</a><p>[3]<a href="http://www.symantec.com/connect/blogs/rig-exploit-kit-used-recent-website-compromise" rel="nofollow">http://www.symantec.com/connect/blogs/rig-exploit-kit-used-r...</a><p>[4]<a href="http://www.jl.ly/Email/palau.html" rel="nofollow">http://www.jl.ly/Email/palau.html</a>