Lockheed Martin - RSA SecurID Hackers First Stop?
Someone hacked into EMC’s RSA division; the creator of SecurID, a hardware fob that provides a coded token for VPN systems used by telecommuting workers. Since the RSA break-in, a rise in malware and phishing campaigns trolling for data that links the information taken in the original EMC breech to the end user has been monitored. Rick Moy, president and CEO of NSS Labs believes that this attack was the opener for the subsequent hacking of Lockheed Martin just days ago, the attack was initiated via Lockheed’s VPN.
After the attack at EMC, Reporter Dan Goodin @ The Register, asked if the seed values for a specific customer were taken and if they could be used to breach a company’s security system by generating pseudo -random numbers on any the tokens, EMC declined to answer.
Foggy responses from EMC about the break in, created some annoyance in the security community and no one thought the lack of information might create a reason to panic, now that Lockheed has taken a hit, the need to look at some better authentication methods for companies across the board is more urgent.
Mark Stephens, aka security blogger Robert Cringely, broke news of the attack against Lockheed Martin, “It seems likely that whoever hacked the RSA SecurID network got the algorithm for the current tokens and manage to get a keylogger on one or more computers to access the intranet”, and after obtaining a valid login they accessed the internal network.
I don’t know if they were wearing “Good Guy” capes but the swift detection of the subtle intrusion was caught by Lockheed Martin, averting what could be a possible disaster. Hackers gained access to the intranet, the company states “our systems remain secure; no customer, program or employee personal data was breached”.Continued on the next page