The secret of a Chinese RSA Hack since 2011

In 2011, a hack shocked the security scene. Chinese hackers have been able to gain access to RSA servers and distribute SecurIDs keys for two-factor authentication (2FA).

After 10 years, the non-disclosure agreement (NDA) to which the two parties are subject is now over. So Andy Greenberg published an article with the information he has.

rsa

In 2011, it became known that strangers were able to break into RSA servers and steal data. RSA sells cryptographic solutions based on the manufacturer's SecureID.

Wikipedia states:

Το RSA SecurID, παλαιότερα αναφερόταν σαν SecurID, είναι ένας μηχανισμός που αναπτύχθηκε από την RSA (θυγατρική της Dell Technologies) για τη διενέργεια ελέγχου ταυτότητας δύο παραγόντων για έναν χρήστη. Ο μηχανισμός ελέγχου ταυτότητας RSA SecurID αποτελείται από ένα "token" - από hardware (π.χ. ένα κλειδί fob) ή από κάποιο λογισμικό (soft token) - το οποίο εκχωρείται σε έναν χρήστη και το οποίο δημιουργεί έναν κωδικό ελέγχου ταυτότητας σε σταθερά διαστήματα (συνήθως 60 δευτερόλεπτα) χρησιμοποιώντας ένα ενσωματωμένο ρολόι και το εργοστασιακά κωδικοποιημένο τυχαίο κλειδί της κάρτας (γνωστό ως “seed”). Το seed είναι διαφορετικό για κάθε token και φορτώνεται στον αντίστοιχο διακομιστή RSA SecurID (RSA Authentication Manager, πρώην ACE/Server). Διατίθενται επίσης tokens κατ 'απαίτηση, τα οποία δίνουν κάποιο κωδικό via email or SMS.

rsa secure sid800

There are several RSA SecureID solutions, such as the USB stick shown above. Various services such as VPN servers, firewalls or OpenSSH that offer the ability to use SecurID for authentication. It was later revealed that hackers were serving seeds and possibly SecureID serial numbers issued by the RSA.

In other words, the entire RAS SecuritID infrastructure collapsed. In May 2011, the Lockheed defense industry servers were breached. According to WikiPedia, several are linking the event to some alleged theft of RSA seeds.

RSA 10 years later

Now 10 years we are talking from the year 2021. There have been administrators who have experienced the nightmare of software attacks Orion σε of Microsoft Exchange. In 2011, people were already looking into the abyss of security, and 10 years later no one seems to have learned.

Officials who handled the RSA incident in 2011 signed a non-disclosure agreement (NDA) with the company, which was valid for 10 years. This period has ended, and so officials are now allowed to speak publicly about the case.

Ο δημοσιογράφος Andy Greenberg, ο οποίος έκανε αποκαλύψεις στην υπόθεση Snowden, φαίνεται να έχει πολλές πληροφορίες από την ομάδα των ανθρώπων που συμμετείχαν στο hack της RSA. Φαίνεται ότι ήταν Κινέζοι hackers που απέσπασαν seeds ή δεδομένα από τους διακομιστές της RSA - και το όλο θέμα κατέληξε στις μονάδες κατασκοπείας του Κινέζικου στρατού, οι οποίοι φυσικά ήθελαν να έχουν πρόσβαση στο hack.

Greenberg has gathered a lot of details on a Wired article. If you open the article in incognito mode, you will be able to read it without being asked to sign up.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
rsa

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).