January 2004 to September 2015 (2024)

RSA was hacked in March. This was one of the biggest hacks in history.

The current theory is that a nation-state wanted to break into Lockheed-Martin and Northrop-Grumman to steal military secrets. They couldn't do it, since these companies were using RSA SecurID tokens for network authentication. So, the hackers broke into RSA with a targeted e-mail attack. They planted a backdoor and eventually were able to gain access to SecurID information that enabled them to go back to their original targets and successfully break in. In the aftermath of the attack, RSA was forced to replace SecurID tokens for their customers around the world.

January 2004 to September 2015 (1)

Already in April, we knew that the attack was launched with a targeted e-mail to EMC employees (EMC owns RSA), and that the e-mail contained an attachment called "2011 Recruitment plan.xls". RSA disclosed this information in their blog post. Problem was, we didn't have the file. It seemed like nobody did, and the antivirus researcher mailing lists were buzzing with discussion about where to find the file. Nobody had it, and eventually the discussion quieted down.

This bothered Timo Hirvonen. Timo is an analyst in our labs and he was convinced that he could find this file. Every few weeks since April, Timo would go back to our collections of tens of millions of malware samples and try to mine it to find this one file — with no luck. Until this week.

Timo wrote a data analysis tool that analyzed samples for flash objects. We knew the XLS file in question used a Flash object to take over the system. The new tool located several relevant samples. However, one of them was not an Excel file. It was an Outlook message file (MSG). When Timo opened it up, he knew he was onto something. The message file turned out to be the original e-mail that was sent to RSA on the 3rd of March, complete with the attachment 2011 Recruitment plan.xls.

After five months, we finally had the file.

And not only that, we had the original e-mail. Turns out somebody (most likely an EMC/RSA employee) had uploaded the e-mail and attachment to the Virustotal online scanning service on 19th of March. And, as stated in the Virustotal terms, the uploaded files will be shared to relevant parties in the anti-malware and security industry. So, we all had the file already. We just didn't know we did, and we couldn't find it amongst the millions of other samples.

January 2004 to September 2015 (2)
The sample was uploaded on 19th of March as file-1994209_msg

So, what did the e-mail look like? It was an e-mail that was spoofed to look like it was coming from recruiting website Beyond.com. It had the subject "2011 Recruitment plan" and one line of content:

"I forward this file to you for review. Please open and view it".

The message was sent to one EMC employee and cc'd to three others.

January 2004 to September 2015 (3)

When opened, this is what the XLS attachment looked like:

January 2004 to September 2015 (4)

Here's a YouTube video that shows in practice what happens when you open the malicious Excel file.

In this video you can see us opening the e-mail to Outlook and launching the attachment. The embedded flash object shows up as a [X] symbol in the spreadsheet. The Flash object is executed by Excel (why the heck does Excel support embedded Flash is a great question). The Flash object then uses the CVE-2011-0609 vulnerability to execute code and to drop a Poison Ivy backdoor to the system. The exploit code then closes Excel and the infection is over.

After this, Poison Ivy connects back to its server at good.mincesur.com. The domain mincesur.com has been used in similar espionage attacks over an extended period of time.

January 2004 to September 2015 (5)

Once the connection is made, the attacker has full remote access to the infected workstation. Even worse, it has full access to network drives that the user can access. Apparently the attackers were able to leverage this vector further until they gained access to the critical SecurID data they were looking for.

The attack e-mail does not look too complicated. In fact, it's very simple. However, the exploit inside Excel was a zero-day at the time and RSA could not have protected against it by patching their systems.

So, was this an Advanced attack? The e-mail wasn't advanced. The backdoor they dropped wasn't advanced. But he exploit was advanced. And the ultimate target of the attacker was advanced. If somebody hacks a security vendor just to gain access to their customers systems, we'd say the attack is advanced, even if some of the interim steps weren't very complicated.

Timo will be discussing his research on the topic in detail in the T2 Data Security conference in October in his talk titled
"How RSA Was Breached".

January 2004 to September 2015 (6)

P.S. For those who are still looking for the sample:

MD5 of the MSG file: 1e9777dc70a8c6674342f1796f5f1c49
MD5 of the XLS file: 4031049fe402e8ba587583c08a25221a

January 2004 to September 2015 (2024)
Top Articles
Manhattan Savings Institution - HSBC Global Archives
Katana vs. Rapier -- Fantasy Worth Considering
Lorton Transfer Station
Angela Babicz Leak
Tabc On The Fly Final Exam Answers
Unblocked Games Premium Worlds Hardest Game
What Are the Best Cal State Schools? | BestColleges
St Petersburg Craigslist Pets
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Craigslist Kennewick Pasco Richland
DL1678 (DAL1678) Delta Historial y rastreo de vuelos - FlightAware
How To Get Free Credits On Smartjailmail
Gunshots, panic and then fury - BBC correspondent's account of Trump shooting
Cinepacks.store
Jasmine
Bill Devane Obituary
Ohiohealth Esource Employee Login
Methodist Laborworkx
Dump Trucks in Netherlands for sale - used and new - TrucksNL
Dexter Gomovies
Studentvue Columbia Heights
Used Sawmill For Sale - Craigslist Near Tennessee
360 Tabc Answers
U Break It Near Me
Ubg98.Github.io Unblocked
Accident On The 210 Freeway Today
Kirksey's Mortuary - Birmingham - Alabama - Funeral Homes | Tribute Archive
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Reicks View Farms Grain Bids
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
10-Day Weather Forecast for Santa Cruz, CA - The Weather Channel | weather.com
Bfri Forum
+18886727547
The value of R in SI units is _____?
Melissa N. Comics
Σινεμά - Τι Ταινίες Παίζουν οι Κινηματογράφοι Σήμερα - Πρόγραμμα 2024 | iathens.gr
Joplin Pets Craigslist
Ark Unlock All Skins Command
Skip The Games Ventura
Afspraak inzien
Pitchfork's Top 200 of the 2010s: 50-1 (clips)
Dee Dee Blanchard Crime Scene Photos
Jasgotgass2
Www Usps Com Passport Scheduler
Chathuram Movie Download
If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
Rocky Bfb Asset
Exploring the Digital Marketplace: A Guide to Craigslist Miami
Studentvue Calexico
Victoria Vesce Playboy
Cvs Coit And Alpha
Canonnier Beachcomber Golf Resort & Spa (Pointe aux Canonniers): Alle Infos zum Hotel
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6568

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.