Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 10 submissions in the queue.
posted by Blackmoore on Friday December 19 2014, @12:22AM   Printer-friendly
from the constant-vigilance dept.

The Internet Corporation for Assigned Names and Numbers (ICANN), one of the core entities for Internet governance and operations, announced that it had been compromied in late November via a "Spear-Phishing" attack.

They state that the compromised credentials were used to access more sensitive systems. Specifically, they mention:

The attacker obtained administrative access to all files in the CZDS [Centralized Zone Data System]. This included copies of the zone files in the system, as well as information entered by users such as name, postal address, email address, fax and telephone numbers, username, and password. Although the passwords were stored as salted cryptographic hashes, we have deactivated all CZDS passwords as a precaution. Users may request a new password at czds.icann.org. We suggest that CZDS users take appropriate steps to protect any other online accounts for which they might have used the same username and/or password. ICANN is providing notices to the CZDS users whose personal information may have been compromised.

They also identified unauthorized access to (ostensibly innocuous parts of) the ICANN GAC [Governmental Advisory Committee] Wiki as well as user-level accounts on the ICANN Blog and the ICANN WHOIS information portal.

While they're not terribly specific about how the attack happened aside from mentioning that the "email credentials of several ICANN staff members" were compromised, it doesn't take much imagination to figure out where it probably went from there. The impact seems rather minimal, but given the level of control that ICANN has over DNS, it does make one wonder how close we came to a major incident.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by HiThere on Friday December 19 2014, @08:46PM

    by HiThere (866) Subscriber Badge on Friday December 19 2014, @08:46PM (#127583) Journal

    Nothing is perfect, but when they were designing MSWind the first thing they did was rip out all the security from the system they were modeling. (To be fair, at that time MSWind systems weren't networked, and the processor was underpowered for what they were trying to do. It was still a bad move.)

    --
    Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2