The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials for the ICANN.org website were compromised.
According to the Internet gatekeeper, an “unauthorized person” obtained usernames/email addresses and password hashes for profile accounts created by users on ICANN.org. These profiles contain information such as public bios, interests, newsletter subscriptions, and user preferences.
ICANN says the password hashes are not easy to crack and there is no evidence that the stolen information has been used to access user profiles. However, as a precaution, the organization is requiring account owners to change their passwords. Users are instructed to create new passwords by accessing the “forgot password” page next time they log in to ICANN.org.
ICANN revealed that the login credentials were compromised within the last week after the systems of an external service provider were breached. The agency says there is no indication that its own systems have been breached.
“No operational information, financial data or IANA systems were involved,” ICANN said.
ICANN has issued several security alerts over the past months. The organization revealed in December that some of its systems were breached after employees fell victim to a spear phishing attack. ICANN said the attackers had not managed to access its most critical systems.
In late February, the gatekeeper took its new gTLD Applicant and GDD (Global Domains Division) portals offline after learning of a vulnerability that could have been leveraged to view users’ data. ICANN later determined that the flaw had been exploited by unauthorized users.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- CISA Releases Open Source Recovery Tool for ESXiArgs Ransomware
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
Latest News
- Chrome 110 Patches 15 Vulnerabilities
- Application Security Protection for the Masses
- Tor Network Under DDoS Pressure for 7 Months
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- UN Experts: North Korean Hackers Stole Record Virtual Assets
- Russian Admits in US Court to Laundering Money for Ryuk Ransomware Gang
- A Deep Dive Into the Growing GootLoader Threat
- CISA Releases Open Source Recovery Tool for ESXiArgs Ransomware
