RSA Pins SecurID Attacks On Nation State
Security firm said it traced the attack on its authentication system to two groups working for one nation state, but declined to name the country.
Those findings came to light Tuesday, during a press conference at the RSA Conference Europe 2011 in London. "There were two individual groups from one nation state, one supporting the other. One was very visible and one less so," said Arthur Coviello, the executive chairman of RSA, and executive VP at parent company EMC, reported the Inquirer.
More Security Insights
- The Untapped Potential of Mobile Apps for Commercial Customers
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- The 451 Group Impact Report: Skybox Enters Vulnerability Management Space
- Securing Big Data: Securosis Recommendations for Hadoop and NoSQL Environments
But Coviello stopped short of naming the nation state that RSA suspected might be involved. "We've not attributed it to a particular nation state although we're very confident that with the skill, sophistication, and resources involved, it could only have been a nation state," he said.
[Think your intrusion detection and prevention systems are tight? Think again: Most Businesses Don't Spot Hack Attacks.]
Coviello's assertion seems destined to raise as many questions as it answers. "It seems very odd to me for a company to say that they have determined that a country had attacked them, but to not then name the country," said Graham Cluley, senior technology consultant at Sophos, in a blog post.
Furthermore, despite the seeming prevalence of attacks blamed on China--including the so-called Aurora attacks against Google and others last year, as well as the Shady RAT cyberespionage campaign discovered by McAfee this year, Cluley recommended exercising caution. "Inevitably, people are likely to assume that China might have been involved in the attack--but there's nothing in RSA's statements to either implicate China or to back up the claims that any country was involved."
RSA had previously disclosed that it had traced the breach to an advanced attack involving an Excel spreadsheet, named "2011 Recruitment plan.xls," which was attached to a poorly worded email that had been sent to an employee in its financial department. The breach--the full extent of which RSA has yet to detail publicly--has been an embarrassment for the company, given that it sells security software, hardware, and expertise.
At the press conference Tuesday, RSA Security president Thomas Heiser faced sharp questioning as to whether his company had correctly handled the resulting breach notification and cleanup correctly, reported the Inquirer. Notably, RSA delayed offering replacement SecurID tokens to many of its customers, and only later offered them to businesses that it had determined to be most at risk, including military contractors. For others, it instead offered security monitoring services.
"We got out to our top 500 customers relatively quickly," said Heiser, but interfacing with the others took more time. "The challenge was that we have tens of thousands of customers and a lot of them we deal with indirectly, so we were reliant on our marketing press and partners."
Since the SecurID breach, RSA has been sounding a greater alarm over the threat posed by nation states, and recently gathered a group of CIOs in Washington to discuss ways of combating the advanced exploits they're seeing, which often rely on social engineering attacks.
Likewise, in his keynote opening the RSA conference on Tuesday, Coviello said that the three most dangerous groups now attacking businesses online are cybercriminals seeking information that carries a dollar value, hacktivist groups aiming to embarrass businesses, and nation states. "For nation-sponsored attackers behind advanced persistent threats, it's about stealth and sophistication," he said. "Through social engineering they do intelligence gathering--sometimes months in advance of the attack. They learn which end users in corporations or government agencies possess the assets they want."
While such attacks may not appear to be highly sophisticated, they're nonetheless effective. "The attack may start with rudimentary malware and a variety of tools no different from the other groups, or if necessary with a true zero-day exploit. The real differences in sophistication are the concentration of resources behind the attack and the efficiency with which these adversaries operate after gaining entry," he said.
In "Becoming A Security Detective," this all-day virtual event from InformationWeek and Dark Reading, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. It happens Oct. 20. Sign up now. (Free with registration.)