A "spearfishing" attack aimed at US-based non profit Internet Corporation for Assigned Names and Numbers (ICANN) hooked staff members with emails crafted to appear as though they were sent from peers using "icann.Org" addresses, according to a blog post.
"The attack resulted in the compromise of the email credentials of several ICANN staff members," ICANN said.
It appeared that the attack commenced in November. Typically, spearfishing attacks dupe people into clicking on links to what appeared to be legitimate email log-in pages but aren't or open attached files booby-trapped with viruses.
User names and passwords were used this month to access a Centralized Zone Data System, where hackers could get hold of files about generic top-level domains as well as names, addresses, passwords and other valuable information about users, according to ICANN.
Hackers were also said to have used compromised passwords to get into an ICANN wiki page; its blog, and a Whois index of registered owners of web addresses.
The blog and Who is did not appear to have been tampered with, according to ICANN, which provided no insight was provided into who was behind the attack.