Throwback Attack: RSA SecurID attack shows the importance of protecting critical assets - Industrial Cybersecurity Pulse (2024)

“If a major cybersecurity company — one of the very companies we rely on to protect our own systems — can’t protect itself, what does that mean for us?” That’s the question defense contractors, government agencies and manufacturers around the world were asking themselves in early 2011 when the shockwaves from the alarming RSA SecurID attack were first starting to ripple across the cybersecurity landscape.

The RSA SecurID breach was a highly sophisticated cyberattack that occurred in March 2011, in which hackers accessed the computer systems of RSA, a company that provides two-factor authentication solutions to many organizations. The hack was a significant blow to the security of the defense industrial base, as RSA’s SecurID tokens were used to authenticate users to computer systems, including those used by defense contractors and the military.

Ultimately, the breach cost RSA parent company EMC $66.3 million to investigate, remediate and monitor the more than 30,000 customers of its SecurID tokens. It was also a canary in the coal mine, warning organizations of the dangers of future supply chain attacks.

The roots of the RSA breach

The RSA attack is still considered one of the most worrisome cyberattacks in history and a real eye-opener to the cybersecurity community about the importance of protecting critical assets. As they often do, the attack began with a phishing email sent to RSA employees that contained a malicious attachment. When an RSA employee opened the attachment, it launched a sophisticated malware program called “Poison Ivy” that allowed attackers to gain access to RSA’s internal network. The attackers then moved laterally through the network, searching for and stealing data related to RSA’s SecurID tokens.

In May 2021, after 10-year nondisclosure agreements had expired, Wired wrote a comprehensive examination of the RSA attack and how it played out in real time. Bill Duane, an engineer with RSA, described the incident as a cat-and-mouse game. As the attackers probed the network and attempted to break into a connected system, the information technology (IT) team would detect them and disable the system. But the attackers would just move on to the next system, leaving defenders chasing their collective tails.

One of the standard pieces of cybersecurity advice most experts and laypeople alike have internalized is using two-factor authentication. Cyber mature companies are already using the technique, which adds an extra layer of security by demanding an additional login credential beyond the simple username and password. Even consumers are used to being asked for a second credential by banks and other institutions. The threat actors were really after the root of RSA’s two-factor authentication program, their special, proprietary sauce.

Their target was, “the secret keys known as ‘seeds,’ a collection of numbers that represented a foundational layer of the security promises RSA made to its customers, including tens of millions of users in government and military agencies, defense contractors, banks and countless corporations around the world,” according to the Wired article. “RSA kept those seeds on a single, well-protected server, which the company called the ‘seed warehouse.’

“They served as a crucial ingredient in one of RSA’s core products: SecurID tokens — little fobs you carried in a pocket and pulled out to prove your identity by entering the six-digit codes that were constantly updated on the fob’s screen.”

The stolen data included information about how the SecurID tokens were programmed and used, which allowed the attackers to create their own tokens that could access the networks of defense contractors and other organizations. The hackers reportedly leveraged the stolen data to launch attacks on major companies, including security and aerospace giant Lockheed Martin, which was forced to shut down its network temporarily and replace SecurID tokens in response.

Other defense contractors and government agencies believed to have been affected by the breach include Northrop Grumman, L-3 Communications and the U.S. military. The full impact of the RSA SecurID breach on these organizations and their networks is still unknown, but it is believed to have had significant implications for national security.

The RSA SecurID attack response

After discovering the SecurID breach, RSA took a number of steps to investigate the attack, protect its customers and prevent similar incidents from happening in the future. One of the first things RSA did was notify its customers about the breach and the potential impact on their systems. Initially — and perhaps before they knew the full extent — they downplayed the attack. The company published an open letter to their customers reading:

“Recently, our security systems identified an extremely sophisticated cyberattack in progress. While at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers, this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.”

As the full extent of the attack became known, the company provided guidance on how to protect customer systems, including recommendations for strong passwords, network segmentation and other security measures.

In addition, RSA worked closely with law enforcement, including the FBI and NSA, and other security experts like Mandiant to investigate the breach and identify the attackers. While the company did not disclose the full breadth of the breach or the identity of the attackers, it did provide regular updates to its customers and the public about its findings and actions.

To prevent similar attacks from happening in the future, RSA implemented a number of security enhancements, including stronger authentication measures, network segmentation, and increased monitoring and threat detection capabilities. But all of this took time. RSA and its customers were still reeling from this breach years after the fact.

Repercussions of the RSA SecurID attack

The RSA SecurID breach was a wake-up call for the defense industry and other organizations about the vulnerability of two-factor authentication systems and the importance of securing the supply chain. While the SolarWinds attack from 2020 made headlines as a major supply chain strike — where a threat actor is able to compromise an upstream, third-party software or hardware supplier to access hundreds of other companies — RSA is considered by many the first of the breed. This turned out to be a nation-state attack, perpetrated by people working for the Chinese People’s Liberation Army, a group cybersecurity response firm Mandiant has called APT1.

“It opened my eyes to supply chain attacks,” said Mikko Hypponen, chief research officer at F-Secure, in the Wired article. “It changed my view of the world: the fact that, if you can’t break into your target, you find the technology that they use and break in there instead.”

More recent attacks like SolarWinds and Okta have proven that this problem is far from fixed. While the more recent strikes may have been shocking in their scope and scale, no one who witnessed the 2011 RSA attack should have been surprised by what happened, as the roadmap had been set a decade before.

In the Wired piece, Duane said the main thing the RSA attack taught him is that “every network is dirty.” This incursion highlighted the need for organizations to remain vigilant and implement strong security measures to protect sensitive information and systems, including regular employee training, network segmentation and, yes, multifactor authentication.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Throwback Attack: RSA SecurID attack shows the importance of protecting critical assets - Industrial Cybersecurity Pulse (2024)

FAQs

What is the RSA cyber attack? ›

Credential theft and data exfiltration: The attackers then sought to compromise the integrity of RSA's SecurID tokens and their underlying algorithms. They successfully exfiltrated a significant amount of stolen data to potentially undermine the security of organizations relying on RSA's technology.

What is the purpose of RSA SecurID? ›

RSA SecurID is multi-factor authentication (MFA) technology used to protect network resources, such as applications and websites. Its purpose is to mitigate risk and maintain compliance without disrupting employee productivity.

Which goals can RSA help to achieve in cyber security? ›

The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as ...

What is the strategy of RSA security? ›

In RSA, choosing a small value for the public key or encryption key 𝐸 can create vulnerabilities that attackers might exploit. While larger values for E improve security, using a small 𝐸 can lead to potential attacks on the encryption scheme. To ensure better security, a larger value for 𝐸 is recommended.

How does RSA attack work? ›

Factorization attack

RSA encryption is only secure if no one can discover the prime numbers p and q from their product n. However, if the prime numbers are too close to each other or are not random and big enough, attackers can factor them, and then it takes little to expose the private key.

What is the security problem of RSA? ›

The security of RSA relies on the practical difficulty of factoring the product of two large prime numbers, the "factoring problem". Breaking RSA encryption is known as the RSA problem. Whether it is as difficult as the factoring problem is an open question.

What data does SecurID collect? ›

Personal information that we collect about you includes the email address used during the registration process. No other personal information is collected, disclosed, or processed in the RSA/SecurID Mobile App. We use your personal information to authenticate you.

How does RSA SecurID work without internet? ›

Users must enter their PIN followed by the emergency tokencode to gain entry to their computers. Offline emergency passcodes. Generate these only for users who have forgotten their PINs and need a full passcode. In such cases, make sure you properly identify the users before providing them with emergency passcodes.

Is RSA SecurID still used? ›

RSA SecurID - Still has it's place

RSA is being used to add MFA to almost all resources. RSA SecurID provides a good agent which can be deployed to servers (Windows and Linux), workstations, and through RADIUS ...

What does RSA stand for in cyber security? ›

RSA is an acronym made up of the first letters of the last names of the three co-founders of the company: Ron Rivest, Adi Shamir and Leonard Adleman.

What is the benefit of RSA? ›

It allows the encryption and safe transmission of data without sending decryption keys beforehand. Digital signatures: RSA algorithm is perfect for digital signatures because the sender can sign a document or message using a private key while the receiver verifies the signature using a public key.

What are the threats to RSA algorithm? ›

Some of the major threats to RSA include:
  • Smaller keys can be cracked easily with factoring and brute forcing (can be prevented by using at least 1024 bits keys).
  • Side channel attacks: Used to assist in breaking RSA by providing information from its implementation.

What is the RSA key vulnerability? ›

SSH Protocol and RSA Vulnerability

The Chinese Remainder Theorem (CRT), a mathematical concept integrated with the RSA algorithm, becomes a focal point in these vulnerabilities. Even though errors during computation are rare, they can expose private keys, compromising the security of communication channels.

Why is RSA so secure? ›

Prime Selection

RSA's security is based off the fact that, given a (large) number N that's the product of two primes p and q, factoring N is hard for people who don't know p and q. Developers are responsible for choosing the primes that make up the RSA modulus.

How can I make my RSA more secure? ›

The larger the prime numbers, the more secure the RSA encryption becomes. This is because larger prime numbers increase the computational complexity required to factorize the modulus, ensuring the security of the encrypted messages.

What is RSA in cyber? ›

Rivest Shamir Adleman (RSA) is a well-known public-key or asymmetric cryptographic algorithm. It protects sensitive data through encryption and decryption using a private and public key pair.

Has RSA ever been hacked? ›

The RSA SecurID breach was a highly sophisticated cyberattack that occurred in March 2011, in which hackers accessed the computer systems of RSA, a company that provides two-factor authentication solutions to many organizations.

What is RSA used for today? ›

RSA allows you to secure messages before you send them. And the technique also lets you certify your notes, so recipients know they haven't been adjusted or altered while in transit. The RSA algorithm is one of the most widely used encryption tools in use today.

Top Articles
Most valued independent neobanks worldwide | Statista
Why Does My Credit Score Matter? - SouthPoint Financial Credit Union
Srtc Tifton Ga
Froedtert Billing Phone Number
Bin Stores in Wisconsin
Wells Fargo Careers Log In
Www Thechristhospital Billpay
Where's The Nearest Wendy's
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Declan Mining Co Coupon
FAQ: Pressure-Treated Wood
O'reilly's Auto Parts Closest To My Location
Void Touched Curio
Available Training - Acadis® Portal
National Weather Service Denver Co Forecast
Tnt Forum Activeboard
History of Osceola County
NBA 2k23 MyTEAM guide: Every Trophy Case Agenda for all 30 teams
Officialmilarosee
Cta Bus Tracker 77
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
How your diet could help combat climate change in 2019 | CNN
zom 100 mangadex - WebNovel
Why do rebates take so long to process?
Ups Drop Off Newton Ks
Cain Toyota Vehicles
Encore Atlanta Cheer Competition
1964 Impala For Sale Craigslist
Club Keno Drawings
Haunted Mansion Showtimes Near Cinemark Tinseltown Usa And Imax
Muma Eric Rice San Mateo
Craigslist West Seneca
Asian Grocery Williamsburg Va
American Bully Xxl Black Panther
Soulstone Survivors Igg
Craigslist Summersville West Virginia
Game8 Silver Wolf
“Los nuevos desafíos socioculturales” Identidad, Educación, Mujeres Científicas, Política y Sustentabilidad
Review: T-Mobile's Unlimited 4G voor Thuis | Consumentenbond
Noaa Marine Weather Forecast By Zone
Jasgotgass2
Samantha Lyne Wikipedia
Cl Bellingham
Walgreens On Secor And Alexis
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Rocket Lab hiring Integration & Test Engineer I/II in Long Beach, CA | LinkedIn
Access One Ummc
Room For Easels And Canvas Crossword Clue
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5892

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.