Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 1 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

ICANN suffers attack which hits central data system

by The Gurus
December 18, 2014
in Editor's News
Share on FacebookShare on Twitter

The Internet Corporation for Assigned Names and Numbers (ICANN) has admitted that a spear phishing attack hit its centralised zone data system (CZDS).
 
In an update, ICANN said that the attacker obtained administrative access to all files in the CZDS, including copies of the zone files in the system, information entered by users such as name, postal address, email address, fax and telephone numbers, usernames and password.
 
“Although the passwords were stored as salted cryptographic hashes, we have deactivated all CZDS passwords as a precaution,” it said.
 
Also accessed was the ICANN GAC wiki with the members-only index page and one individual user’s profile page viewed; and unauthorised access was also obtained to user accounts on two other systems: the ICANN blog and the ICANN WHOIS information portal.
 
It said: “No impact was found to either of these systems. Based on our investigation to date, we are not aware of any other systems that have been compromised, and we have confirmed that this attack does not impact any IANA-related systems.
 
Troy Gill, manager of security research at AppRiver, said: “ICANN being hacked is quite a scary proposition, as an attacker with unfettered access to the entire ICANN system/s could have caused to serious issues. However, the damage looks to be fairly minimal this time.
 
“This hack goes to show that not only are internet regulators fallible but they can be a very enticing target given an attackers motivations. The attackers relied on the tried and true method of spear phishing emails to gain access to several staff accounts and pivoted from there.
 
“The most concerning system that they were able to gain access to is the CZDS. The good news is that the passwords were all stored in salted cryptographic hashes making them virtually useless to the attacker. As an added measure, all stolen passwords were quickly deactivated by ICANN.”
 
TK Keanini, CTO of Lancope, said: “Readers should really consider themselves in the same boat here, as attacks like this are common and only increasing. The important measure here is how long it took them to discover the attack as the article noted that it happened in late November and was only discovered last week. Some companies don’t identify the attacks for years so by that measure ICANN was on top of their game.
 
“The people who are listed in these top level zones and everyone who is a DNS administrator should be on top alert because they are likely to be the next target in this spear phishing campaign. In fact, you just need to think about how you or your organisation is connected to ICANN and its data and go about changing authentication or any other data if known by the adversary could be used for an attack. Start threat modelling and thinking like the attacker.”
 
Earlier this year, ICANN said that it began a program of security enhancements in order to strengthen information security for all ICANN systems. It said: “We believe these enhancements helped limit the unauthorised access obtained in the attack. Since discovering the attack, we have implemented additional security measures.”
 
Kevin Epstein, VP of advanced security at governance at Proofpoint, said that infiltrating organisations via phishing and social media is a le
ading tactic for such headline-making breaches. “Everyone’s human, and people click,” he said. “The weakest link in security sits between the mouse and the chair – as our research showed, after 100 email phishing messages enter a company, sufficient people will have clicked to download multiple copies of malware if no targeted attack protection is in place.
 
“This is not simple spam; these are sophisticated malicious communications, that even professionals frequently miss. Even the best-trained organisations in our study showed multiple clicks on every phishing campaign.”
 

FacebookTweetLinkedIn
Tags: APTPhishingSpear
ShareTweet
Previous Post

US Government points finger at North Korea for Sony hack

Next Post

RandomStorm to be acquired by Accumuli

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information