گروهی از هکرهای اینترنتی با حمله به سیستمهای سازمان آیکان که مدیریت دامنه های اینترنتی را در دست دارد توانستند به بخشهای مدیریتی آن دسترسی پیدا کنند.
با توجه به مسئولیت خاص آیکان برای مدیریت دامنه های اینترنتی موفقیت حملات هکری به آن میتواند تبعات فراوانی داشته باشد. ظاهرا هکرها با ارسال ایمیل های فریبنده ای برای برخی کارکنان آیکان و انجام حملات موسوم به فیشینگ توانسته اند اطلاعات ضروری را برای اجرای حمله هکری موفق به دست اورند.
آیکان با صدور بیانیه ای اعلام کرده که در حال تحقیق بر روی این موضوع است و اظهار داشته که به نظر می رسد شبکه آن قربانی حملات فیشینگ شده که از ماه نوامبر گذشته صورت گرفته است.این ایمیل ها از آن جهت موجب فریب کارکنان آیکان شده که از طریق دامنه هایی که ظاهرا متعلق به آیکان بوده اند ارسال شده اند. از جمله بخش هایی که هکرها توانسته اند به آن نفوذ کنند می توان به CZDS Centralized Zone Data System اشاره کرد. این سیستم حاوی فایل هایی است که در آنها داده های توضیح دهنده اسامی دامنه (Top Level Domains TLDs) ذخیره شده اند. هکرها از همین طریق توانسته اند به اطلاعات دیگری مانند اسامی مالکان دامنه ها، آدرس پستی و ایمیل و همین طور شماره تلفن های آنها دسترسی پیدا کنند. تحقیقات در مورد عوامل این حملات و میزان خسارات وارده ادامه دارد.
ICANN در حقیقت یک سازمان بین المللى است غیر تجارى است که مسئولیت ادرس هاى اینترنتى ، پروتکل هاى شناسایى و دامنه هاى اینترنتى عمومى و کشورى و همچنین مدیریت روت سرورهاى اصلى اینترنت را برعهده دارد.
به خاطر آنکه این شرکت در ایالات متحده قرار دارد این سرویس ها تمامى تحت قراردهاى دولت ایالات متحده و همچنین مسئول شماره ها و نام هاى اینترنتى این کشور (IANA) قرار دارد. ICANN در حقیقت وظایف IANA را انجام مى دهد.
ساختار آیکان به نوعى نیمه دولتى است و تلاش آن حفظ ثبات در اینترنت و فراهم کردن فضاى رقابتى درآن در جهت افزایش ارتباطات اینترنتى است.
شرکت سیمنتک اعلام کرده است که در روز گذشته بیش از ۱۲ بار هکرها حملات فیشینگ به سرورها انجام داده اند که در چندماه اخیر بی سابقه بوده است.پیش از این نیز در ماه اکتبر حملاتی صورت گرفته که حدود ۶۵% از اطلاعات لو رفته اند.
منبع : darkreading
ICANN Hit By Cyberattack
ICANN Hit By Cyberattack
Spear phishing campaign led to attackers gaining administrative access to one system.
The Internet Corporation for Assigned Names and Numbers (ICANN), the organization responsible for managing the Internet’s use of domain names, was recently compromised by a spear phishing campaign.
In an alert earlier this week, ICANN said it is investigating an intrusion into its networks that appears related to a spear phishing campaign in late November. Several members of ICANN’s staff received email messages that purported to have been sent from within ICANN’s own domain. The email credentials of several ICANN staff members were compromised in the attack.
Those credentials were later used to gain administrative access to ICANN’s Centralized Zone Data System (CZDS), ICANN said in its alert.
ICANN describes CZDS as a system that contains files containing data describing a portion of the domain space for Top Level Domains (TLDs). “Zone files contain the information needed to resolve domain names to Internet Protocol (IP) numbers,” according to ICANN. Files in the CZDS include domain names, their associated name server names and the IP addresses for those name servers.
By gaining administrative access system, the attackers would have had access to not just the zone files but also information entered by users such as their names, addresses, email addresses and phone numbers.
“Although the passwords were stored as salted cryptographic hashes, we have deactivated all CZDS passwords as a precaution,” ICANN said. The alert recommended that users of CZDS take additional measures to protect other accounts for which they might have used the same passwords.
Dan Kaminsky, chief scientist at White Ops and one of only seven individuals with the authority to recover the Internet’s root DNS keys in an emergency, said the attackers are unlikely to have been able to do much with their access.
“The reality is there’s many layers of protection here, because the root–for all its importance–is actually really quite small,” Kaminsky said via email. “The fundamental design of DNS works by putting the least data at the point of maximum centralization. Nothing got changed in this attack, as far as we’re aware of.”
Attacks like this highlight the continuing danger organizations face from spear-phishing campaigns that involve the use of highly targeted emails to deliver malware. Though decidedly low-tech in approach, spear-phishing emails have proved to be one of the most effective means of delivering malware on corporate systems in recent years.
Until relatively recently, more than 9 out of 10 attacks involving advanced persistent threats were initiated via a spear phishing campaign. Even the mega breach at Target began with the attackers using a phishing email to steal the login credentials of a third-party vendor which they then used to gain a foothold on Target’s network.
While spear phishing remains a major threat, there are signs that hackers have begun moving to other delivery mechanisms of late. According to security vendor Symantec, the number of spear phishing attacks per day has kept coming down steadily over the past 12 months.
In October, the average was about 45 per day, the company said. Of the attachments used in such email-based attacks, the .doc attachment type comprised 62.5 percent and .exe attachments made up 14.4 percent,” the company noted.
The companies most frequently targeted in these attacks belonged to the finance, insurance and real estate sectors. Companies in these industries received 28 percent of all spear phishing emails followed by companies in the manufacturing sector, which received about 17 percent, Symantec noted.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year