The secret of a Chinese RSA Hack since 2011

In 2011, a hack rocked the security scene. Chinese hackers managed to gain access to RSA και να διανέμουν κλειδιά SecurIDs για τον έλεγχο ταυτότητας δύο παραγόντων (2FA).

After 10 years, the non-disclosure agreement (NDA) to which the two parties are subject is now over. So Andy Greenberg published an article with the information he has.

rsa

In 2011, it became known that unknown individuals were able to infiltrate RSA servers and steal . RSA sells cryptographic solutions based on the manufacturer's SecureID.

Wikipedia states:

RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA (a subsidiary of Dell Technologies) to perform two-factor authentication for a user. The RSA SecurID authentication mechanism consists of a “token” – either hardware (eg a key fob) or software (soft token) – that is assigned to a user and that generates an authentication code at fixed intervals (typically 60 seconds) using a built-in clock and the card's factory-coded random key (known as a “seed”). The seed is different for each token and is uploaded to the corresponding RSA SecurID server (RSA Manager, πρώην ACE/). On-demand tokens are also available, which give a password via email or SMS.

rsa secure sid800

There are several RSA SecureID solutions, such as the USB stick shown above. Various services such as VPN servers, firewalls or OpenSSH that offer the ability to use SecurID for authentication. It was later revealed that hackers were serving seeds and possibly SecureID serial numbers issued by the RSA.

In other words, the entire RAS SecuritID infrastructure collapsed. In May 2011, the servers of the defense industry Lockheed Martin were hacked. According to WikiPedia, several people associate the event with some supposed of RSA seeds.

RSA 10 years later

We have been talking for 10 years now since the year 2021. There were administrators who experienced the nightmare of attacks on SolarWinds Orion software on vulnerabilities in Microsoft Exchange. In 2011, people were already looking into the abyss of security, and 10 years later no one seems to have learned.

Officials who handled the RSA incident in 2011 signed a non-disclosure agreement (NDA) with the company, which was valid for 10 years. This period has ended, and so officials are now allowed to speak publicly about the case.

Journalist Andy Greenberg, who made the revelations in the Snowden case, seems to have a lot of information from the group of people involved in the RSA hack. It appears that it was Chinese hackers who extracted seeds or data from RSA servers - and the whole issue ended up with Chinese military spies, who of course wanted access to the hack.

Greenberg has gathered a lot of details on a Wired article. If you open the article in incognito mode, you will be able to read it without being asked to sign up.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
rsa

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).