Middle East targetsDNSpionage attacks might date back to at least 2017, according to FireEye senior manager of cyber espionage analysis Ben Read. The list of targets included website registrars and internet service providers, particularly in the Middle East. "We've seen primarily targeting of email names and passwords," Read said of what is being dubbed "DNSpionage." "There is evidence that it is coming out of Iran and being done in support of Iran." ICANN held an emergency meeting and is putting out word to website and online traffic handlers to ramp up security or leave users vulnerable to being tricked into trusting the wrong online venues. DNSpionage hackers appeared intent on stealing account credentials, such as email passwords, in Lebanon and the United Arab Emirates, according to Crowdstrike cybersecurity firm vice president of intelligence Adam Meyers. Similar attacks took place in Europe and other parts of the Middle East, with targets including governments, intelligence services, police, airlines, and the oil industry, cybersecurity specialists said. "You definitely need knowledge of how the internet works you and have to handle a lot of traffic being directed to you," Meyers said of the DNSpionage hackers. "With that access, they could temporarily break portions of how the internet works. They chose to intercept and spy on folks."