RSA Pins SecurID Attacks On Nation State

  /     /     /  
Publicated : 22/11/2024   Category : security


RSA Pins SecurID Attacks On Nation State


Security firm said it traced the attack on its authentication system to two groups working for one nation state, but declined to name the country.



10 Companies Driving Mobile Security (click image for larger view and for slideshow)
RSA has traced the attack against its network, resulting in the compromise of sensitive information relating to its two-factor SecurID authentication system, to two groups, working for one nation state.
Those findings came to light Tuesday, during a press conference at the RSA Conference Europe 2011 in London. There were two individual groups from one nation state, one supporting the other. One was very visible and one less so, said Arthur Coviello, the executive chairman of RSA, and executive VP at parent company EMC, reported
the
Inquirer
.
But Coviello stopped short of naming the nation state that RSA suspected might be involved. Weve not attributed it to a particular nation state although were very confident that with the skill, sophistication, and resources involved, it could only have been a nation state, he said.
[Think your intrusion detection and prevention systems are tight? Think again:
Most Businesses Dont Spot Hack Attacks
.]
Coviellos assertion seems destined to raise as many questions as it answers. It seems very odd to me for a company to say that they have determined that a country had attacked them, but to not then name the country, said Graham Cluley, senior technology consultant at Sophos, in a
blog post
.
Furthermore, despite the seeming prevalence of attacks blamed on China--including the so-called
Aurora attacks
against Google and others last year, as well as the
Shady RAT
cyberespionage campaign discovered by McAfee this year, Cluley recommended exercising caution. Inevitably, people are likely to assume that China might have been involved in the attack--but theres nothing in RSAs statements to either implicate China or to back up the claims that any country was involved.
RSA had previously disclosed that it had traced the breach to an
advanced attack
involving an Excel spreadsheet, named 2011 Recruitment plan.xls, which was attached to a poorly worded email that had been sent to an employee in its financial department. The breach--the full extent of which RSA has yet to detail publicly--has been an embarrassment for the company, given that it sells security software, hardware, and expertise.
At the press conference Tuesday, RSA Security president Thomas Heiser faced sharp questioning as to whether his company had correctly handled the resulting
breach notification and cleanup
correctly, reported the
Inquirer
. Notably, RSA delayed offering
replacement SecurID tokens
to many of its customers, and only later offered them to businesses that it had determined to be most at risk, including military contractors. For others, it instead offered security monitoring services.
We got out to our top 500 customers relatively quickly, said Heiser, but interfacing with the others took more time. The challenge was that we have tens of thousands of customers and a lot of them we deal with indirectly, so we were reliant on our marketing press and partners.
Since the SecurID breach, RSA has been sounding a greater alarm over the threat posed by nation states, and recently gathered a group of CIOs in Washington to discuss ways of combating the advanced exploits theyre seeing, which often rely on
social engineering attacks
.
Likewise, in his keynote opening the RSA conference on Tuesday, Coviello said that the three most dangerous groups now attacking businesses online are cybercriminals seeking information that carries a dollar value, hacktivist groups aiming to embarrass businesses, and nation states. For nation-sponsored attackers behind advanced persistent threats, its about stealth and sophistication, he said. Through social engineering they do intelligence gathering--sometimes months in advance of the attack. They learn which end users in corporations or government agencies possess the assets they want.
While such attacks may not appear to be highly sophisticated, theyre nonetheless effective. The attack may start with rudimentary malware and a variety of tools no different from the other groups, or if necessary with a true zero-day exploit. The real differences in sophistication are the concentration of resources behind the attack and the efficiency with which these adversaries operate after gaining entry, he said.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
RSA Pins SecurID Attacks On Nation State