{"id":1496,"date":"2015-08-26T03:47:06","date_gmt":"2015-08-25T19:47:06","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1496"},"modified":"2015-08-26T03:47:06","modified_gmt":"2015-08-25T19:47:06","slug":"classics-the-2011-rsa-hack","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/classics-the-2011-rsa-hack\/","title":{"rendered":"Classic Hacks: The 2011 RSA SecurID Attack"},"content":{"rendered":"
In 2011 RSA Security \u2013 the folks who provide the SecurID 2 factor authentication devices to millions of people \u2013 was hacked by a phishing email. This is an important hack to remember for three reasons.<\/p>\n
One, the phishing email was primitive and should have been seen for what it was \u2013 a fake.<\/p>\n
Two, the attack demonstrates that even security companies are vulnerable to simple social engineering techniques.<\/p>\n
Three, a common form of 2-Factor authentication was compromised, possibly leaving many millions of users at risk.<\/p>\n
Hackers sent RSA employees two emails over two days. One was from \u2018webmaster\u2019 at a fake beyond.com site. The subject line said, \u20182011 staffing plan.\u2019 Upon opening the email, targets saw an attached excel spreadsheet titled, \u20182011 staffing plan.’<\/p>\n
From there, all that needed to happen was to click the MS Excel file.<\/p>\n
If the recipient clicked on the attachment an Excel spreadsheet opened, which was completely blank except for an “X” that appeared in the first box of the spreadsheet. The “X” was the only visible sign that there was an embedded Flash exploit in the spreadsheet.<\/p>\n
When the spreadsheet opened, Excel triggered the Flash exploit to activate, which then injected a backdoor — in this case a backdoor known as Poison Ivy — onto the system. From there, the hackers could remotely control the machine, reaching the systems and data they sought.<\/p>\n
The true impact of this hack has never been fully explained by RSA. We do know that they spent upwards of $66 million recovering from the hack.<\/p>\n
What is striking is how easily a security company was compromised \u2013 and how deeply.<\/p>\n
Employees, via social engineering, were once again shown to be the easiest entry point for hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"
In 2011 RSA Security \u2013 the folks who provide the SecurID 2 factor authentication devices to millions of people \u2013 was hacked by a phishing email. This is an important hack to remember for three reasons. One, the phishing email was primitive and should have been seen for what it was \u2013 a fake. Two, […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[123,124,50,125,126,127],"class_list":["post-1496","post","type-post","status-publish","format-standard","hentry","category-security-news","tag-classic-hacks","tag-flash-exploits","tag-phishing","tag-poison-ivy","tag-rsa-2011-hack","tag-securid"],"yoast_head":"\n