The RSA SecurID Hack: A Lesson on Protecting Your Most Critical Assets - Telos Corporation (2024)

Blog Home /...

The RSA SecurID Hack: A Lesson on Protecting Your Most Critical Assets - Telos Corporation (2)


WIRED magazine
recently published a deep dive into the 2011 security breach that cost EMC, the parent company of RSA, $66.3 million – costs to investigate the breach, shore up its IT systems and monitor transactions of the more than 30,000 customers of its SecurID two-factor authentication token.

Ten years later, the RSA hack is still considered to be among the worst cybersecurity breaches to date. It started with phishing emails to two employees which contained malware. When the email was opened, the malware exploited a zero-day vulnerability in Adobe Flash to install software called Poison Ivy on the victim’s machine to gain access to RSA’s networks. Exploiting stolen login credentials, the attackers broke into RSA’s network and searched until they found hundreds of credentials belonging to more privileged administrators, which gave the intruders nearly unlimited access to enterprise resources.

The breach was a nightmare happening in real time. According to Bill Duane, a veteran RSA engineer, the attackers fanned out across the network; they would attempt to break into a connected system, get detected a minute or two later, and an IT team would go in after them and disable the system. The intruders would then move onto the next system and the game of cat and mouse continued.

The keys to the kingdom – the SecurID seeds

During the frenzied chase, the IT team identified the attacker’s real target – the SecurID seeds – the crown jewel of RSA’s two-factor authentication system. The seeds that RSA distributed to their customers that enabled them to set up servers and generate the matching authentication codes used by the SecurID tokens. By stealing the seeds, the cybercriminals now had the keys to millions of locked doors on the internet. They could generate the authentication codes without the physical tokens. In order to stem the data leak and salvage the business, all of RSA’s systems were shut down.

Organizations today have in their toolkit a plethora of network security tools that can be used to protect the edge of the network and endpoints. From anonymous VPNs and firewalls to intrusion detection systems and WAFs, all are designed to keep out attackers. Most organizations have implemented least-privileged access to help reduce the overall attack surface area. And Zero Trust security approaches take this concept one step further with the belief that no one is to be trusted. Access is cut off until the network is able to verify who you are and whether you are authorized to be on the network and to access its resources.

But – what about protecting your most sensitive data? How confident are you that your enterprise network security is sufficient to protect mission-critical assets whose compromise could result in an “extinction event,” as one of the RSA threat hunters described their own breach?

“Every network is dirty”: Protecting your critical assets with a virtual obfuscation network.

In the decade since, the brutal RSA breach has remained a wake-up call for cybersecurity professionals – “every network is dirty,” as the Wired article puts it, and attackers can get in when they really want to. In which case, how can organizations protect their most critical assets when cybercriminals breach their networks?

According to Duane, the RSA engineer, every organization needs to “cordon off” their most critical assets from the rest of the network so they remain inaccessible even if there is a breach. For RSA, what needed “cordoning off” was their SecurID seed server. For a healthcare provider, it could be their e-healthcare record repository. For a bank, it could be their financial transactions. For an energy firm, it could be data from their SCADA network – or the network itself.

That’s where a virtual obfuscation network comes into play.The organization’s critical assets can reside on a hidden server that is only accessible through the virtual obfuscation network, which itself is hidden from unauthorized users. Network obfuscation uses a combination of technologies that include multi-layered encryption, dynamic IP routing, varying network pathways, and eliminating source and destination IP addresses to eliminate the presence of a user, asset, or resource on the internet. Because after all, you can’t exploit what you can’t see.

To learn more about how the Telos Ghost virtual obfuscation network can help to protect your critical assets, visit: www.telos.com/offerings/telos-ghost

CybersecurityTelos Ghost

The RSA SecurID Hack: A Lesson on Protecting Your Most Critical Assets - Telos Corporation (3)

Tom Badders

Senior Product Manager

Tom Badders is a Senior Product Manager at Telos Corporation.

Read full bio

The RSA SecurID Hack: A Lesson on Protecting Your Most Critical Assets - Telos Corporation (2024)

FAQs

Has RSA ever been hacked? ›

The RSA SecurID breach was a highly sophisticated cyberattack that occurred in March 2011, in which hackers accessed the computer systems of RSA, a company that provides two-factor authentication solutions to many organizations.

What was the attack vector for the infamous 2011 RSA hack? ›

The attack was initiated with a basic phishing attack, where the attackers sent low-level RSA employees emails that appeared to be company emails regarding recruiting. One of these employees opened an attachment in this email which triggered the attack.

What was the RSA SecurID breach in 2011? ›

In March 2011, RSA Security, a leading provider of cybersecurity solutions, fell victim to a significant cyberattack. The attack was sophisticated and carried out by a highly skilled group of hackers, who were believed to be state-sponsored.

What was stolen from RSA from the security division of EMC? ›

In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecurID product. The solution was in-use by thousands of high-profile clients around the world, including the U.S. government and an array of U.S. defense contractors.

Why is RSA not secure anymore? ›

When implemented incorrectly, RSA is vulnerable to many different attacks. RSA key length is crucial for encryption security, but longer keys require a lot of computing power to generate, so they are not always sustainable. The decryption also takes long and requires a lot of resources.

Is it possible to break RSA encryption? ›

But a big enough quantum computer, because it can use qubits to process data in parallel, could be used to easily crack even large keys generated using algorithms such as RSA in days if not hours. Powerful quantum computers do not exist today, but experts believe they may become viable in a number of years.

What attack is RSA vulnerable to? ›

The attack that is most often considered for RSA is the factoring of the public key. If this can be achieved, all messages written with the public key can be decrypted.

What is the number one attack vector that hackers use? ›

Weak and compromised credentials are the most-used attack vector as people continue to use weak passwords to protect their online accounts and profiles. Compromised credentials occur when information like usernames or passwords are exposed to a third party such as mobile apps and websites.

What are the 5 attack vectors? ›

Common Attack Vector Examples
  • Compromised Credentials. ‍Usernames and passwords are still the most common type of access credential and continue to be exposed in data leaks, phishing scams, and malware. ...
  • Weak Credentials. ...
  • Insider Threats. ...
  • Missing or Poor Encryption. ...
  • Misconfiguration. ...
  • Ransomware. ...
  • Phishing. ...
  • Vulnerabilities.
Jan 18, 2024

Is RSA SecurID safe? ›

RSA's SecurID hardware tokens impose no health or safety risk to people involved with installation, maintenance or use.

What data does SecurID collect? ›

Personal information that we collect about you includes the email address used during the registration process. No other personal information is collected, disclosed, or processed in the RSA/SecurID Mobile App. We use your personal information to authenticate you.

Is RSA SecurID a VPN? ›

RSA SecurID Access ensures that users have secure and convenient access to the VPN—from any device, anywhere—while providing high confidence that access attempts are legit. RSA delivers the single solution that can modernize your access to VPN, on-premises and cloud applications.

How did RSA get hacked? ›

So, the hackers broke into RSA with a targeted e-mail attack. They planted a backdoor and eventually were able to gain access to SecurID information that enabled them to go back to their original targets and successfully break in.

Who owns RSA security? ›

On September 1, 2020, Symphony Technology Group (STG) completed its acquisition of RSA from Dell Technologies.

Can RSA encryption be hacked? ›

RSA with short key (like 256bits or 512bits) is easily cracked. RSA with key generated by wrong process (like backdoored Dual_EC_DRBG - Wikipedia) can be easily cracked by someone who knows the back door. But RSA as a whole is still secure.

How secure is RSA encryption? ›

RSA is secure, but it's being implemented insecurely in many cases by IoT manufacturers. More than 1 in every 172 RSA keys are at risk of compromise due to factoring attacks. ECC is a more secure alternative to RSA because: ECC keys are smaller yet more secure than RSA because they don't rely on RNGs.

Is RSA key exchange secure? ›

RSA has widely used cryptography in a network environment, and it supports the software and hardware as mentioned below: Assures confidentiality, integrity, and authentication of electronic communication. Secure electronic communication. RSA is used in security protocols such as IPsec, TLS/SSL, SSH.

Is RSA 2048 still secure? ›

According to the recommendation of the National Institute of Standards and Technology (NIST), the smallest RSA key size that can be considered secure is 2,048 bits. This means approximately 600 digits, but in many cases larger keys of 3,072 or 4,096 bits are also used.

Top Articles
The number one issue for Canadians in 2024: The unaffordable cost of living
How Businesses Can Utilize the Ethereum network? | The Enterprise World
The Blackening Showtimes Near Century Aurora And Xd
Dte Outage Map Woodhaven
Rainbird Wiring Diagram
Kentucky Downs Entries Today
Sunday World Northern Ireland
Espn Expert Picks Week 2
Natureza e Qualidade de Produtos - Gestão da Qualidade
Qhc Learning
Craigslist Apartments In Philly
iOS 18 Hadir, Tapi Mana Fitur AI Apple?
Available Training - Acadis® Portal
Games Like Mythic Manor
Define Percosivism
Echat Fr Review Pc Retailer In Qatar Prestige Pc Providers – Alpha Marine Group
Best Uf Sororities
Yakimacraigslist
Nhl Tankathon Mock Draft
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Sef2 Lewis Structure
Jeffers Funeral Home Obituaries Greeneville Tennessee
Minnick Funeral Home West Point Nebraska
Holiday Gift Bearer In Egypt
Sunset Time November 5 2022
Manuela Qm Only
Is Light Raid Hard
Access a Shared Resource | Computing for Arts + Sciences
Enduring Word John 15
Cylinder Head Bolt Torque Values
Weather Underground Durham
Winterset Rants And Raves
Parent Management Training (PMT) Worksheet | HappierTHERAPY
Greater Orangeburg
Ghid depunere declarație unică
Chicago Pd Rotten Tomatoes
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Tyler Perry Marriage Counselor Play 123Movies
Ursula Creed Datasheet
Man Stuff Idaho
Postgraduate | Student Recruitment
Nina Flowers
Arcane Bloodline Pathfinder
Best GoMovies Alternatives
18006548818
Login
Conan Exiles Colored Crystal
Dying Light Mother's Day Roof
Sapphire Pine Grove
Syrie Funeral Home Obituary
How to Choose Where to Study Abroad
Pauline Frommer's Paris 2007 (Pauline Frommer Guides) - SILO.PUB
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 5400

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.