Security experts, DHS, lawmakers react to RSA hack

Powered by SC Magazine
 

In the absence of details from RSA, speculation is amplified.

Five days after RSA revealed its systems were breached by a sophisticated attack, details were scant about how customers of its SecurID two-factor authentication products may be affected.

Still, that hasn't stopped many in the security community from speculating.

Here are latest details emerging:

The US Department of Homeland Security (DHS) has joined the investigation into the compromise.

"Working with RSA, we are leveraging the technical, investigative and mitigation expertise of US Government agencies to address this issue," said Amy Kudwa, a DHS spokesman.

"We take threats to our cyber infrastructure as seriously as we take threats to our conventional, physical infrastructure. DHS is also in the process of distributing similar information to our critical infrastructure partners."

Republican senator Susan Collins chairan of the Homeland Security Committee, said the "need to pass comprehensive cybersecurity legislation is more urgent than ever" following disclosure of the breach.

She said Congress should mandate how private and public sector players collaborate to deter attacks.

Steven Bellovin, a computer science professor at Columbia University in New York, offered a technical analysis of the breach. He provided customer-impact scenarios, but suggested the biggest risk might be that the hackers gained access to the source code of RSA's back-end systems, used to deploy tokens to organisations.

"There's a lot of code needed for maintaining databases, adding and deleting users, making backups, synchronizing master and secondary copies of databases and more," Bellovin wrote.

"An attacker who could penetrate these administrative systems doesn't have to worry about key generation or cryptanalysis; they could simply steal existing keys or insert new ones of their own."

Adam Shostack, author of The New School of Information Security blogged Monday that attackers may be after more than the "seeds," used to generate valid, unique SecurID six-digit token values. The thieves may also have acquired customer lists to target organisations.

"My opinion is that social engineers using the contacts database in some way is more likely than a cryptanalytic attack, and a cryptanalytic attack is more likely than a compromise of a secrets database," he wrote.

"But we don't know. Speculating like mad isn't helping."

Bruce Schneier, chief security technology officer at BT Global Services, opined that because the SecurID tokens have no "upgrade path" RSA stood to lose business from customers opting for a competitor's product. But it was unclear whether users can expect to see targeted or far-reaching attacks.

"One, [the culprits] are a sophisticated organisation who want the information for a specific purpose," Schneier wrote.

"The attackers [in this case] actually are on RSA's side in the public-relations spin, and we're unlikely to see widespread use of this information.

"Or, two, they stole the stuff for conventional criminal purposes and will sell it. In that case, we're likely to know pretty quickly."

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1089

Vote