Skip to main content

RSA SecurID data stolen by a “nation state”

RSA SecurID
Image used with permission by copyright holder

Last March, infiltrators carried out a quiet cyberattack against RSA, obtaining information about the operation of its SecurID tokens, hardware devices used by corporations, governments, and organizations to establish secure VPN connections with remote employees. RSA admitted the breach in April and began replacing SecurID tokens last June, but now RSA is revealing a bit more about the attack. Speaking at a Q&A session at the RSA Conference in London, RSA chairman Art Coviello said the attack’s methodology revealed that two separate teams were at work, and the company is very confident that the skill and resources required by the attack had to have been supported by a nation.

“We’ve not attributed it to a particular nation state although we’re very confident that with the skill, sophistication and resources involved it could only have been a nation state,” ZDNet UK quotes Coviello as saying.

RSA was apparently the victim of a targeted malware attack via a spreadsheet sent to a small number of employees, carefully worded to get someone to open the attachment. At least one did, and a malicious Adobe Flash object within the spreadsheet exploited a zero-day vulnerability that enabled the attackers to install a remote access Trojan horse. Once that was in place, hackers used the Trojan to explore RSA’s internal network and look for information about how its SecurID tokens operate. And they found it: information gleaned from the attack was subsequently used in an unsuccessful attack against U.S. defense contractor Lockheed Martin.

SecurID tokens are used as an additional layer of security over-and-above standard username-password combinations as a way to secure VPN logins from untrusted networks—like the Internet. When users connect, they’re prompted for an authorization key displayed on the SecurID token issued to them. These numeric keys change at a fixed interval (usually every minute)—the idea is that even if an attacker has a user’s name and password, they’d still need a unique number to access the network—and that number constantly changes. The information stolen in the RSA breach apparently enabled attackers to generate SecurID keys without the physical tokens.

Some industry watchers have expressed skepticism that the attack was carried out by a nation, noting there’s nothing in particular about the attack as subscribed that points to a government-backed operation. Yes, the information gleaned in the attack was used to go after a defense contractor, but the data could easily have been sold or changed hands numerous times after the attack—there’s not necessarily a direct connection between the perpetrators of the breach and the attackers who went after Lockheed Martin.

“It seems very odd to me for a company to say that they have determined that a country had attacked them, but to not then name the country,” wrote Sophos’ Graham Cluley in its Naked Security blog.

RSA has not disclosed how many tokens it replaced in the wake of the breach, but indicated that replacement had been completed by August.

Editors' Recommendations

Topics
Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
How to change mouse DPI on Windows and Mac
An individual using a gaming mouse.

You can change your mouse DPI, or its sensitivity, pretty quickly in both Windows and macOS -- and many top gaming mice can do it with a simple press of a button. This can be a great way to boost accuracy in some games, to make you more productive at work, or just to give you greater control and accuracy of your mouse pointer.

Whatever your reason, though, here's how to change your mouse DPI.

Read more
How to dual boot Linux and Windows
A person using a Linux laptop.

Windows might be your bread and butter, but you can dual-boot it with Linux if you want to tinker, or play around with a wider range of open source software. Whether you're using Windows 10 or Windows 11, you can install a range of different Linux distributions as a secondary operating system to give you the best of both worls.

Here's how to dual boot Windows and Linux.

Read more
Hurry! The Razer Blade 17 gaming laptop is 44% off today
Cyberpunk 2077 running on the Razer Blade 17.

Razer is currently running a huge sale which includes one of the best gaming laptop deals we’ve seen in a while. Today, you can buy the Razer Blade 17 for 44% off bringing the price down from $3,800 to $2,100. This is a great price for an equally great gaming laptop and sure to appeal to anyone seeking great laptop deals. If you’re keen to learn more about it, keep reading while we take you through why it’s worth your money.

Why you should buy the Razer Blade 17
Razer is one of the best gaming laptop brands out there. Crucially, it’d likely top the list if it wasn’t that its laptops are frequently expensive so when one is on sale, it shoots right up the list of brands to check out. That’s because Razer laptops are stylish, slimmer than most, while still packing plenty of power.

Read more