Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking

    RSA Blames SecurID Breach on Two Attacker Groups, Unnamed Country

    Written by

    Fahmida Y. Rashid
    Published October 12, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Two separate groups of attackers, most likely funded by a nation-state, were behind the attack on RSA Security, the company’s senior executives said at a conference.

      Two unidentified hacker groups who had not previously worked together collaborated on the attack against RSA Security earlier this year, Tom Heiser, president of the EMC subsidiary, and Art Coviello, the executive chairman, told attendees at RSA Conference Europe in London in a joint-keynote speech on Oct. 11. The attackers possessed inside information about the company’s computer naming conventions and Active Directory, which helped disguise the malicious activity as legitimate network traffic, Heiser said.

      RSA executives were “very confident” that the groups had been supported by a nation-state because of the skill, sophistication and resources necessary to launch the attack. However, they declined to name the country they considered was responsible.

      “We can only conclude it was a nation-state sponsored attack,” Heiser said.

      Organizations should not fall in the trap of thinking that nation-states would not be interested in attacking them, according to Coviello. “Think a nation state is not interested in you? Think again! They might use you to go after someone else,” he said.

      Details about how RSA had been compromised have been trickling out ever since the company first admitted the breach in March. The attackers used various pieces of malware, some developed specifically for this attack, to penetrate the RSA network, Heiser said. They also compressed and encrypted the data before transferring them out of the network, making it harder to identify the traffic as malicious.

      “Our adversary was determined, persistent and very well coordinated. They knew what to look for and where to go,” Heiser said.

      In August, researchers at Dell SecureWorks Counter Threat unit traced malware used in the attack back to two APT malware families and tied to a network in Shanghai. Dell SecureWorks noted that despite uncovering the network hosting the malware, there was not enough information to identify “who” the perpetrators were.

      Later that month, F-Secure researchers analyzed the malicious Excel spreadsheet that had been emailed to a small number of RSA employees during the attack. The “2011 Recruitment Plan.xls” file contained an embedded Flash file which exploited an Adobe zero-day vulnerability to download a remote access Trojan on to the computer.

      It seemed “very odd” for a company to say a country had attacked them but not name the country, Graham Cluley, senior technology consultant at Sophos, wrote on the Naked Security blog. While he hasn’t “seen or heard anything which has convinced me that a nation state had to be involved,” it was likely that another country would have a motive for attacking a military contractor, according to Cluley.

      While RSA initially claimed the breach did not compromise the SecurID two-factor authentication technology, it turned out the thieves were able to use the stolen information to attack at least one major United States defense contractor in May.

      “We will never keep up with individual attacks but we can create systems with the resiliency to withstand any attack,” Coviello said, insisting that the SecurID technology remained secure.

      “The RSA algorithm is still effective today because it solved the problem of privacy generically-not in response to a specific threat,” he told RSA Europe attendees.

      RSA has not disclosed everything it knows about the attacks because the company doesn’t want to give the attackers an idea of how much of their activities have been uncovered, according to Heiser. “They were stealthy but they did leave some information behind,” Heiser said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.