ste williams
  • Home
  • Account
  • Membership List
  • Protected Content
  • Registration
  • Security Library
  • Thank-You Page
  • Tools
    • New Build
    • Open Source Security Tools
  • Daily
    • Client
    • Learn
    • Positions
    • Service Status
  • Reference
    • Country Codes – ISO 3166
    • General Reference
    • Hex Colour Values
    • Port Numbers 0-1024
    • Technical Reference
      • ANSI/VT100 Terminal Control Escape Sequences
      • Basic DOS Commands
      • Basic FTP Commands
      • Basic HTML4 Tags
      • Basic NET Commands
      • Basic VI Commands
      • Mac Excel Keyboard Shortcuts
      • OSX Keyboard Shortcuts
      • Papers & Presentations
      • Security Baselines
  • About Me
  • Public Key

Pages

  • Account
  • Home
  • Membership List
  • Protected Content
  • Registration
  • Security Library
  • Thank-You Page
  • Tools
    • New Build
    • Open Source Security Tools
  • Daily
    • Client
    • Learn
    • Positions
    • Service Status
  • Reference
    • Country Codes – ISO 3166
    • General Reference
    • Hex Colour Values
    • Port Numbers 0-1024
    • Technical Reference
      • ANSI/VT100 Terminal Control Escape Sequences
      • Basic DOS Commands
      • Basic FTP Commands
      • Basic HTML4 Tags
      • Basic NET Commands
      • Basic VI Commands
      • Mac Excel Keyboard Shortcuts
      • OSX Keyboard Shortcuts
      • Papers & Presentations
      • Security Baselines
  • About Me
  • Public Key

Tags

amazon anonymous apple Birgitta Jónsdóttir China crime data destruction ddos ecrime email EMC encryption facebook Google hack hacking IE ipad iphone jailbreak julian assange law loic lulzsec mastercard microsoft mobile phones openleaks password paypal PS3 RSA security skype sniffing snooping Sony stuxnet twitter UK Gov us gov visa website wi-fi wikileaks

Second Defence Contractor Targeted in RSA SecurID-Based Hack

Jun 02, 2011 ~ Written by adm

Defence giant L-3 Communications has become the second victim of an attempted hack attack that relied on the RSA SecurID hack that took place earlier this year.

A leaked internal memo, obtained by Wired, said that L-3’s Stratus group had been actively targeted with attacks based on “leveraging compromised information” from the SecurID keyfob two-factor authentication system. It’s unclear whether these attacks succeeded or how L-3 came to pin the blame on RSA’s SecurID system. L-3, which supplies command and control systems to the US military, would only say that it takes security seriously and that this particular incident had been resolved, without saying how.

News of the attempted L-3 breach comes days after LockHeed Martin suspended remote access and began re-issuing keyfob tokens following the detection of hacking attacks also linked to the high-profile breach against RSA back in March. The manufacturer of F-22 and F-35 fighter planes confirmed the attempted hack, first reported by tech blogger Robert Cringely, which took place on or around the weekend on 21 May. In a statement, Lockheed confirmed the attempted hack but said that its “systems remain secure; no customer, program or employee personal data has been compromised”.

Unidentified hackers broke into RSA network back in March before extracting unspecified information related to SecurID, possibly the seed used to generate one-time codes supplied by its tokens and their associated serial numbers. Armed with this information, an attacker would need only to obtain the PIN a user logs in with in order to gain the same rights to access sensitive information, highly valuable blueprints and more. PIN numbers might be extracted using keylogging Trojans, possibly punted via targeted emails (ie spear phishing).

It may be that Lockheed Martin and L-3 responded after detecting just this type of attack but this is just an educated guess on our part. Pending a clearer statement from RSA on what was taken during the original hack, we can be forgiven for assuming the worst.

RSA has said how it was attacked but not what data was extracted, aside from saying that this “information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack”. EMC’s security division added at the time that it was working with customers to make sure their systems remained secure.

Source

Posted in library - Tagged EMC, hack, L-3, LockHeed Martin, RSA, securID
Twitter • Facebook • Delicious • StumbleUpon • E-mail
←
→
Comments are disabled

Recent Posts

  • Australia’ Smart meter leaders lag in securing devices 27/04/2017
  • Homebrew crypto SNAFU on electrical grid sees GE rush patches 27/04/2017
  • Unplug the Bitcoin miner and do us all a favour: Antminer has remote shutdown flaw 27/04/2017
  • Beware of geeks bearing gifts: Evil game guides infect 2 million Androids 27/04/2017
  • Linux kernel security gurus Grsecurity oust freeloaders from castle 27/04/2017
  • Chipotle may have banished E coli, but now it has a new infection 27/04/2017
  • Microsoft App Aims to Delete the Password 27/04/2017
  • USAF Launches ‘Hack the Air Force’ 27/04/2017
  • HHS Hits CardioNet with $2.5M HIPAA Settlement Fee 27/04/2017
  • How much are you giving away to fraudsters on Facebook? 26/04/2017

Pure Line theme by Theme4Press  •  Powered by WordPress ste williams