Verisign has become the latest company to suffer a targeted attack on its corporate systems.
A report from Reuters references filings Verisign made with the US Securities and Exchange Commission (SEC) last year in reporting that its Reston, Virginia facility was breached in 2010 by attackers.
The breach is not believed to have resulted in a compromise of the DNS system. The company said none of its servers connected to the platform were breached in the attack.
"After a thorough analysis of the attacks, Verisign stated in 2011, and reaffirms, that we do not believe the operational integrity of the DNS was compromised," the company said.
"We have a number of security mechanisms deployed in our network to ensure the integrity of the zone files we publish."
Verisign, which oversees administration of the .com, .gov and .net domains, has long served as the primary guardian of the DNS platform, which connects web domain names with the corresponding IP addresses of their servers.
In 2010, Verisign agreed to sell off its identity authentication services to security giant Symantec.
A spokesperson for Symantec confirmed to V3 that the acquired services were not affected by the breach.
DNS security has been a concern in recent years, as Verisign and others have worked to roll out the DNSSec platform. The platform was extended into the .com domain in April of last year.
Prior to the development of DNSSec, researchers such as Dan Kaminsky had worried the platform could be manipulated by criminals to redirect users from valid sites to phishing pages without their knowledge.
New cable will connect Virginia to France
Loon's balloons will bring the internet to remote areas of the country
New clues into the biosphere on Earth in the lead up to the emergence of animal life
Planetary collision might shed light on the chaotic processes behind a star's early development