ITBusiness.ca

What you should know about the RSA SecurID breach

RSA’s disclosure last Thursday that it has suffered a sophisticated cyberattack in which attackers obtained some type of information about RSA’s SecurID product for two-factor authentication is prompting a variety of suggestions in how customers should deal with the problem.

RSA Executive Chairman Art Coviello in a public statement says RSA was breached by a so-called Advanced Persistent Threat attack, a phrase often given to mean a stealthy and sometimes long-term attack (some would say by a foreign country or rival organization) aimed at obtaining valued corporate information, including customer data and intellectual property, such as source code.

Related stories

Pushdo botnet pummels more than 300 Web sites

Google Apps boosts security with two-factor authentication

 

RSA has not yet divulged specifics about the APT attack of which it has found evidence and says it’s now interacting with customers of its SecurID product on the situation. But security analysts are also quickly trying to size up the situation, advising their clientele who are RSA customers about a stance they might take.

In a blog posting, security analyst Rich Mogull of firm Securosis offered advice for confronting RSA directly with a few main questions. These were:

In his blog, Mogull, who notes, “Sorry to you folks at RSA,” says late last night RSA let them know that they’ve filed an 8K form with the SEC and that there’s an active investigation and the government is involved, so RSA is fairly limited in what they can say.

As part of the 8K filing, RSA includes a note it has sent out to RSA SecurCare customers, in which it offers its own advice:

In addition to several other general recommendations, the RSA note to its customers offer 1-800 numbers for assistance with questions. The RSA note also says that while “certain information” has been extracted from RSA’s systems, RSA at this point is “confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers, but this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.”

Exit mobile version