Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    RSA Attackers May Have Hit 760 Other Organizations With Similar Malware

    Written by

    Fahmida Y. Rashid
    Published October 24, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The malware used to compromise RSA Security earlier this year may have been used in attacks against more than 700 other organizations, according to a report by security writer and analyst Brian Krebs.

      Facebook, Google and eBay are among the 760 organizations that may have been hit by malware that used the same command and control infrastructure as the one used in the RSA breach, security writer Brian Krebs wrote on Krebs On Security on Oct. 24. Of the total list, about 20 percent are considered to be Fortune 100 companies.

      The organizations on the list had networks that were compromised with “some of the same resources” used to hit RSA, according to Krebs. The networks were “phoning home” to some of the same C&C servers from the RSA breach, and the first attack could have been as early as November 2010.

      “No one has been willing to talk publicly about which other companies may have been hit,” Krebs said, noting that security professionals had long suspected that RSA Security wasn’t the sole victim of the sophisticated malware that exploited several zero-day vulnerabilities.

      These organizations were not compromised using data stolen from RSA Security, Krebs warned, but were likely hit by an RSA-style attack. The attackers may have been searching for information that could be used to launch other secondary attacks such as the one launched against defense contractor Lockheed Martin in May.

      RSA Security disclosed in spring that some of its systems had been infected by a malicious Excel spreadsheet booby-trapped with exploits targeting zero-day vulnerabilities in Adobe Flash Player. The attackers had targeted recruiters and human resources staff. Art Coviello, RSA’s chairman, warned about Advanced Persistent Threats and how adversaries are developing sophisticated threats designed to lurk in networks and not be detected by traditional defense systems.

      Krebs did not disclose how the data was compiled or who conducted the analysis. Security professionals provided the list of organizations in a series of ongoing meetings with Congressional staff regarding APTs, according to Krebs.

      However, it was worth noting that the list may not be entirely accurate because some of the organizations might not have been actually targeted. Security organizations, such as McAfee, Fortinet and Computer Emergency Response Team (CERT), on the list probably “intentionally compromised” their own systems to reverse-engineer the malware, Krebs said. Practically every major internet service provider around the world, including China Telecomm, Comcast and the United Kingdom’s Orange was also included in the list, but it was more likely that one of their subscribers had been infected by the malware instead of the service provider’s networks.

      With the information available, it is not clear how many systems in each of the networks were actually infected or whether attackers successfully transferred sensitive data to remote servers for every single one of the victims. It is also not known how long the intruders were able to persistently lurk in the network. The breach for some of these organizations could have been minor, with only a single throwaway system, or it might have been extensive with several systems compromised.

      A majority, or about 88 percent, of the C&C servers used in the attacks were located in China. There were other servers in South Korea, Brazil, India, Italy, Pakistan, the United States and the United Kingdom. Krebs said “the overwhelming majority” of the Chinese networks were located in or around Beijing.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.