China Hacked RSA, U.S. Official Says

  /     /     /  
Publicated : 22/11/2024   Category : security


China Hacked RSA, U.S. Official Says


And RSA official responds to Gen. Keith Alexanders telling Congress this week that Chinese attackers were behind the SecurID breach last year



Until this week, no one has ever confirmed publicly what everyone has suspected all along: that China was behind the advanced attack against RSAs SecurID systems last year. That was the revelation by the head of the U.S. Cyber Command in a Congressional hearing on Tuesday.
Gen. Keith Alexander was asked by the chairman of the Senate Armed Services Committee for examples he could provide publicly of cyberattacks by China against U.S. interests. Alexander, who is also the director of the National Security Agency, then named RSA as a victim of Chinese cyberespionage. In his prepared testimony earlier in the hearing, he had pointed to
the March 2011 targeted attack against RSA
(PDF) as an example of intellectual property theft at the hands of cyberattackers, but didnt elaborate on the origin of the attackers until pressed by committee chair Sen. Carl Levin.
RSA all along has been tight-lipped about who may have been behind the attack, noting that the attack had the earmarks of a nation-sponsored adversary.
So what does RSA say about Alexanders revelation? Our position has always been that we arent going to speculate on the attackers identity. There are certain characteristics that are consistent with the notion of a state-sponsored actor, says Eddie Schwartz, CSO at RSA.
Schwartz went on to say: The notion to keep in mind is that when a government official speaks out about something like a perpetrator of an attack, they are speaking from the position they have, whether its intelligence or law enforcement, having access to enormous amounts of data -- a perspective that a private company usually doesnt have.
Schwartz says the investigation is still considered ongoing and in the hands of law enforcement.
Although he wouldnt comment on whether law enforcement has kept RSA up-to-date on its findings in the investigation, he says they do keep in close touch with the authorities. RSA maintains very close relationships with law enforcement ... certainly, with respect to ongoing investigations, we imagine maintaining close relationships, he says.
NSAs Alexander basically confirmed the worst-kept secret, that Chinese attackers were behind the RSA breach,
where information on SecurID two-factor authentication products was stolen in an advanced persistent threat-style attack against the security vendor
.
At least one security researchers later found clues that pointed to China as the possible culprit. Joe Stewart, director of malware research for Dell Secureworks,
discovered a pattern of APT attackers using a tool called HTran, written 10 years ago by a Chinese hacker, to hide their whereabouts
. Stewart located the actual C&C servers used by the attackers involved with the Shady RAT APT cyberespionage campaign -- which, according to McAfee, stole intellectual property from 70 government agencies, international companies, nonprofits, and others in 14 countries -- and narrowed down the main hubs in Beijing and Shanghai.
And two of the APT malware families Stewart studied were used in the RSA breach in March, he said.
Meanwhile, Alexanders comments were the first official ones uttered on China as the perpetrator; there has been plenty of speculation and assumption within the security community as such.
The ability to do it against a company like RSA is such a high-order capability that, if they can do it against RSA, that makes other companies vulnerable, Alexander told Congress,
according to a report in InformationWeek
.
In his prepared testimony, Alexander mentioned the epidemic in cyberespionage and its fallout. State-sponsored industrial espionage and theft of intellectual capital now occurs with stunning rapacity and brazenness, and some of that activity links back to foreign intelligence services, he said. Companies and government agencies around the world are thus being looted of their intellectual property by national intelligence actors, and those victims understandably turn for help to their governments.
Michael Sutton, vice president of security research for Zscaler ThreatLabZ, says U.S. businesses should be on alert for these types of attacks. The RSA attack has long been considered to be the work of Chinese attackers, but the statements made by General Alexander certainly leave little doubt as to the true origin of the attacks, Sutton said in a statement. U.S.-based enterprises, especially those with valuable intellectual property related to information technology and national security, should assume that they are being actively targeted on a regular basis.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
China Hacked RSA, U.S. Official Says