Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/18/2014
09:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

ICANN Hit By Cyberattack

Spear phishing campaign led to attackers gaining administrative access to one system.

The Internet Corporation for Assigned Names and Numbers (ICANN), the organization responsible for managing the Internet’s use of domain names, was recently compromised by a spear phishing campaign.

In an alert earlier this week, ICANN said it is investigating an intrusion into its networks that appears related to a spear phishing campaign in late November. Several members of ICANN’s staff received email messages that purported to have been sent from within ICANN's own domain. The email credentials of several ICANN staff members were compromised in the attack.

Those credentials were later used to gain administrative access to ICANN's Centralized Zone Data System (CZDS), ICANN said in its alert.

ICANN describes CZDS as a system that contains files containing data describing a portion of the domain space for Top Level Domains (TLDs). “Zone files contain the information needed to resolve domain names to Internet Protocol (IP) numbers,” according to ICANN. Files in the CZDS include domain names, their associated name server names, and the IP addresses for those name servers.

By gaining administrative access system, the attackers would have had access to, not just the zone files, but also information entered by users such as their names, addresses, email addresses, and phone numbers.

“Although the passwords were stored as salted cryptographic hashes, we have deactivated all CZDS passwords as a precaution,” ICANN said. The alert recommended that users of CZDS take additional measures to protect other accounts for which they might have used the same passwords.

Dan Kaminsky, chief scientist at White Ops and one of only seven individuals with the authority to recover the Internet’s root DNS keys in an emergency, said the attackers are unlikely to have been able to do much with their access.

“The reality is there's many layers of protection here, because the root -- for all its importance -- is actually really quite small,” Kaminsky said via email. “The fundamental design of DNS works by putting the least data at the point of maximum centralization. Nothing got changed in this attack, as far as we're aware of."

Attacks like this highlight the continuing danger organizations face from spear-phishing campaigns that involve the use of highly targeted emails to deliver malware. Though decidedly low-tech in approach, spear-phishing emails have proved to be one of the most effective means of delivering malware on corporate systems in recent years.

Until relatively recently, more than nine out of ten attacks involving advanced persistent threats were initiated via a spear phishing campaign. Even the mega breach at Target began with the attackers using a phishing email to steal the login credentials of a third-party vendor, which they then used to gain a foothold on Target’s network.

While spear phishing remains a major threat, there are signs that hackers have begun moving to other delivery mechanisms of late. According to security vendor Symantec, the number of spear phishing attacks per day has kept coming down steadily over the past 12 months.

In October, the average was about 45 per day, the company said. Of the attachments used in such email-based attacks, the .doc attachment type comprised 62.5 percent and .exe attachments made up 14.4 percent,” the company noted.

The companies most frequently targeted in these attacks belonged to the finance, insurance, and real estate sectors. Companies in these industries received 28% of all spear phishing emails, followed by companies in the manufacturing sector, which received about 17%, Symantec noted.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.