RSA attacked by two groups

Powered by SC Magazine
 

Claims nation-state led the attack, but lacks evidence to lay blame.

RSA has confirmed that a nation state actor was one of two groups behind the attack against the company earlier this year.

Executive chairman Art Coviello said at the RSA Conference Europe that the sophistication of the attack could only originate from a nation state.

Howver he said RSA lacks the forensic evidence to attribute the attacks.

“For us, the breach was a validation of our strategy that a perimeter defence was not effective and that is why we bought NetWitness so that we were able to do remediation."

"There has been no successful attacks with the information and only one incident where the information taken was used in an attack.”

Eddie Schwartz, CISO of RSA, who arrived at the company as a result of the NetWitness acquisition, said that the attackers abused the naming convention and had an understanding of the network.

Coviello later said that two groups attacked the company and coordinated from a nation state, with one supporting another and one that was very visible.

RSA president Tom Heiser refused to disclose the cost of replacing tokens and said supply met demand around August.

“We got to to the top 500 customers relatively quickly and the challenge was to meet the needs of tens of thousands of customers, so we used our marketing and press departments to identify those customers. We could not hand-pick who we went to.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


RSA attacked by two groups
Tags
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 333

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 138

Vote