• United States



by Gregg Keizer, Computerworld

ICANN Blames Site Hijack on Registrar

Jul 08, 20082 mins
CybercrimeNetwork SecurityPrivacy

Though ICANN didn't name the registrar, a WHOIS search fingers

The international organization that oversees the Web’s top-level domain naming system said that the hijacking last month of several of its domains was the result of a security breach at the registrar that manages those URLs.

Although it did not name the registrar explicitly, according to WHOIS searches, New York-based manages the domains that were redirected, as well as the primary and domains.

Two weeks ago, Turkish hackers rerouted traffic to some of the domains used by the Internet Corporation for Assigned Names and Numbers (ICANN) and one of its subsidiary organizations, the Internet Assigned Numbers Authority (IANA).

Visitors who intended to reach,, and on June 26 were instead shunted to an illegitimate destination that displayed a taunting message: “You think that you control the domains but you don’t! Everybody knows wrong. We control the domains including ICANN! Don’t you believe us?”

Through its IANA subsidiary, ICANN manages the DNS root zone and assigns the DNS operators for the Internet’s top-level domains, such as .com and .org. DNS, which translates the domains and URLs – such as – into IP addresses, is a critical component of the Web’s traffic-guiding infrastructure. ICANN, meanwhile, manages the assignment of domain names and IP addresses.

Although an ICANN spokesman provided a terse explanation shortly after the attack, only last week did the organization provide more information. In a statement posted to its Web site on Thursday, ICANN said the attack had been launched against the Internet registrar responsible for the victimized domains, not against the organization itself.

“The DNS redirect was a result of an attack on ICANN’s registrar’s systems,” said ICANN. “A full, confidential, security report from that registrar has since been provided to ICANN with respect to this attack.”

According to ICANN, the attack was two-pronged. “It would appear the attack was sophisticated, combining both social and technological techniques, but was also limited and focused,” the organization said. “The redirect was noticed and corrected within 20 minutes; however, it may have taken anywhere up to 48 hours for the redirect to be entirely removed from the Internet.”

While ICANN said it is “confident” that new measures will prevent a repeat of the embarrassing incident, it also acknowledged that it has launched an internal review of its security procedures. did not immediately reply to a request for comment.